Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
15 résultats taggé Akira  ✕
Rapport d’incident – Cyberattaque du 28/07/2025 – Francelink https://status.francelink.net/rapport-dincident-cyberattaque-du-28-07-2025
18/08/2025 12:12:01
QRCode
archive.org

status.francelink.net - Rapport d’incident – Cyberattaque du 28/07/2025
Nous savons que vous attendez avec impatience des informations claires sur l’incident survenu le 28 juillet 2025 et sur l’avancée de nos actions. Conscients de l’impact important que cette situation peut avoir sur vos activités, nous avons travaillé à vous fournir ce rapport dès que nous avons pu rassembler des éléments fiables. Il présente les faits connus à ce jour, les mesures mises en place, les premières avancées dans la récupération des données, ainsi que les prochaines étapes prévues pour rétablir vos services dans les meilleures conditions possibles.

  1. Résumé de l’incident
    Le 28 juillet 2025 à 20h30, notre infrastructure a été la cible d’une attaque informatique sophistiquée menée par un groupe cybercriminel identifié sous le nom “AKIRA”.
    Cette attaque a impacté environ 93 % de nos serveurs, affectant la quasi-totalité de nos services d’hébergement et de nos clients.

Deux actions malveillantes ont été menées de façon coordonnée :

Chiffrement des données sur nos serveurs de production.
Chiffrement de nos serveurs de sauvegarde.
Les éléments dont nous disposons indiquent qu’une extraction de données a très probablement eu lieu dans le cadre de cette attaque, conformément au mode opératoire habituel du groupe AKIRA. À ce stade, nous ne connaissons pas encore l’ampleur réelle de cette fuite et les analyses sont toujours en cours.

  1. Impact sur les services
    Disponibilité : L’ensemble de nos services a été interrompu immédiatement après la détection de l’attaque.
    Données clients : Les données hébergées sont actuellement inaccessibles car chiffrées, mais les premières récupérations ont déjà eu lieu.
    Durée estimée de l’interruption : Bien que la remise en ligne complète des services et données prenne du temps, nous avons déjà réussi à récupérer partiellement des données pour certains clients depuis jeudi 07/08/2025 et vendredi 08/08/2025. De nouvelles vagues de récupération sont prévues dans les jours et semaines à venir, ce qui permettra, nous l’espérons, un rétablissement progressif (conditionné par la qualité des données récupérées).
  2. Mesures prises
    Dès la détection de l’attaque :

Isolement complet de l’infrastructure et coupure immédiate des accès réseaux.
Mise en place d’un environnement sécurisé pour empêcher toute propagation.
Lancement d’une procédure de réponse à incident avec intervention d’experts en cybersécurité.
Mandat d’un premier prestataire spécialisé en récupération de données. Ce dernier a conclu que la tâche dépassait ses capacités au bout de 4 jours.
Engagement d’un second prestataire, mieux équipé pour gérer ce type de situation, qui a permis de récupérer une première partie de données (cf ci-dessus).
Planification de nouvelles vagues de récupération pour les jours à venir.

  1. Démarches légales et réglementaires
    Déclaration officielle effectuée auprès de la CNIL, de l’ANSSI et du Procureur de la République dans les 72 heures suivant l’incident.
    Chaque client détenant des données personnelles est tenu de réaliser sa propre déclaration CNIL conformément au RGPD.
  2. Prochaines étapes
    Migration de l’infrastructure vers Microsoft Azure en cours afin d’améliorer la résilience et la sécurité.
    Déploiement quotidien de nouveaux serveurs.
    Services déjà remis en ligne (actuellement sans données issues de notre infrastructure) :
    Serveurs mutualisés hébergeant PHP / WordPress.
    Serveurs dédiés.
    Serveurs mutualisés WebDev (prévu pour cette semaine).
    Restauration progressive des données récupérées à mesure des vagues de récupération.
    Un formulaire a été mis en place pour permettre à chaque client de nous indiquer les éléments les plus critiques à récupérer en priorité. Cela nous aide à concentrer nos efforts sur l’essentiel et accélérer la remise en ligne des données les plus importantes pour vos activités.
    mise à jour : Ce communiqué à fait l’objet d’une légère reformulation, apportant plus de détails sur certains points.
status.francelink.net FR francelink cyberattaque France Akira
From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira https://thedfirreport.com/2025/08/05/from-bing-search-to-ransomware-bumblebee-and-adaptixc2-deliver-akira/
05/08/2025 18:50:03
QRCode
archive.org

thedfirreport.com - Bumblebee malware has been an initial access tool used by threat actors since late 2021. In 2023 the malware was first reported as using SEO poisoning as a delivery mechanism. Recently in May of 2025 Cyjax reported on a campaign using this method again, impersonating various IT tools. We observed a similar campaign in July in which a download of an IT management tool ended with Akira ransomware.

In July 2025, we observed a threat actor compromise an organization through this SEO poisoning campaign. A user searching for “ManageEngine OpManager” was directed to a malicious website, which delivered a trojanized software installer. This action led to the deployment of the Bumblebee malware, granting the threat actor initial access to the environment. The intrusion quickly escalated from a single infected host to a full-scale network compromise.

Following initial access, the threat actor moved laterally to a domain controller, dumped credentials, installed persistent remote access tools, and exfiltrated data using an SFTP client. The intrusion culminated in the deployment of Akira ransomware across the root domain. The threat actor returned two days later to repeat the process, encrypting systems within a child domain and causing significant operational disruption across the enterprise.

This campaign affected multiple organizations during July as we received confirmation of a similar intrusion responded to by the Swisscom B2B CSIRT in which a malicious IT tool dropped Bumblebee and also ended with Akira ransomware deployment.

thedfirreport.com EN 2025 Bumblebee Bing Search AdaptixC2 Akira ransomware
Weak password allowed hackers to sink a 158-year-old company https://www.bbc.com/news/articles/cx2gx28815wo
23/07/2025 19:38:38
QRCode
archive.org
thumbnail

BBC - Transport company KNP forced to shut down after international hacker gangs target thousands of UK businesses.
One password is believed to have been all it took for a ransomware gang to destroy a 158-year-old company and put 700 people out of work.

KNP - a Northamptonshire transport company - is just one of tens of thousands of UK businesses that have been hit by such attacks.

Big names such as M&S, Co-op and Harrods have all been attacked in recent months. The chief executive of Co-op confirmed last week that all 6.5 million of its members had had their data stolen.

In KNP's case, it's thought the hackers managed to gain entry to the computer system by guessing an employee's password, after which they encrypted the company's data and locked its internal systems.

KNP director Paul Abbott says he hasn't told the employee that their compromised password most likely led to the destruction of the company.

"Would you want to know if it was you?" he asks.

"We need organisations to take steps to secure their systems, to secure their businesses," says Richard Horne CEO of the National Cyber Security Centre (NCSC) - where Panorama has been given exclusive access to the team battling international ransomware gangs.

One small mistake
In 2023, KNP was running 500 lorries – most under the brand name Knights of Old.

The company said its IT complied with industry standards and it had taken out insurance against cyber-attack.

But a gang of hackers, known as Akira, got into the system leaving staff unable to access any of the data needed to run the business. The only way to get the data back, said the hackers, was to pay

bbc.com EN 2025 KNP Transport shutdown Akira ransomware
Akira doesn’t keep its promises to victims — SuspectFile https://databreaches.net/2025/06/02/akira-doesnt-keep-its-promises-to-victims-suspectfile/
04/06/2025 13:17:35
QRCode
archive.org

Over on SuspectFile, @amvinfe has been busy exposing Akira’s false promises to its victims. In two posts this week, he reports on what happened with one business in New Jersey and one in Germany that decided to pay Akira’s ransom demands. He was able to report on it all because Akira failed to secure its negotiations chat server. Anyone who knows where to look can follow along if a victim contacts Akira to try to negotiate any payment for a decryptor or data deletion.

In one case, the victim paid Akira $200k after repeatedly asking for — and getting — assurances that this would all be kept confidential. In the second case, Akira demanded $6.9 million but eventually accepted that victim’s offer of $800k. The negotiations made clear that Akira had read the terms of the victim’s cyberinsurance policy and used that to calculate their demands.

If the two victims hoped to keep their names or their breaches out of the news, they may have failed. Although SuspectFile did not name them, others with access to the chats might report on the incidents. Anyone who read the chats would possess the file lists of everything Akira claimed to have exfiltrated from each victim. Depending on their file-naming conventions, filenames may reveal proprietary or sensitive information and often reveal the name of the victim.

So the take-home messages for current victims of Akira:

Akira has not been keeping its negotiations with you secure and confidential.
Paying Akira’s ransom demands is no guarantee that others will not obtain your data or find out about your breach.
Even just negotiating with Akira may be sufficient to provide researchers and journalists with data you do not want shared.
If you pay Akira and they actually give you accurate information about how they gained access and elevated privileges, you are now more at risk from other attackers while you figure out how to secure your network.

databreaches EN 2025 Akira ransomware promises
Hitachi Vantara takes servers offline after Akira ransomware attack https://www.bleepingcomputer.com/news/security/hitachi-vantara-takes-servers-offline-after-akira-ransomware-attack/
04/05/2025 13:08:23
QRCode
archive.org
thumbnail

Hitachi Vantara, a subsidiary of Japanese multinational conglomerate Hitachi, was forced to take servers offline over the weekend to contain an Akira ransomware attack.

The company provides data storage, infrastructure systems, cloud management, and ransomware recovery services to government entities and some of the world's biggest brands, including BMW, Telefónica, T-Mobile, and China Telecom.

In a statement shared with BleepingComputer, Hitachi Vantara confirmed the ransomware attack, saying it hired external cybersecurity experts to investigate the incident's impact and is now working on getting all affected systems online.

"On April 26, 2025, Hitachi Vantara experienced a ransomware incident that has resulted in a disruption to some of our systems," Hitachi Vantara told BleepingComputer.

"Upon detecting suspicious activity, we immediately launched our incident response protocols and engaged third-party subject matter experts to support our investigation and remediation process. Additionally, we proactively took our servers offline in order to contain the incident.

"We are working as quickly as possible with our third-party subject matter experts to remediate this incident, continue to support our customers, and bring our systems back online in a secure manner. We thank our customers and partners for their patience and flexibility during this time."

bleepingcomputer EN 2025 Akira Cyberattack Hitachi Hitachi-Vantara Ransomware
Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours — new counterattack breaks encryption | Tom's Hardware https://www.tomshardware.com/tech-industry/cyber-security/akira-ransomware-cracked-with-rtx-4090-new-exploit-to-brute-force-encryption-attack
17/03/2025 21:20:17
QRCode
archive.org
thumbnail

Tinyhack publishes a full how-to guide on brute-forcing past the Akira ransomware's encryption attack and freeing captive files.

tomshardware EN 2025 Akira ransomware RTX4090 ceack Tinyhack brute-forcing
Fog ransomware targets SonicWall VPNs to breach corporate networks https://www.bleepingcomputer.com/news/security/fog-ransomware-targets-sonicwall-vpns-to-breach-corporate-networks/
27/10/2024 15:39:07
QRCode
archive.org
thumbnail

Fog and Akira ransomware operators have increased their exploitation efforts of CVE-2024-40766, a critical access control flaw that allows unauthorized access to resources on the SSL VPN feature of SonicWall SonicOS firewalls.

bleepingcomputer EN 2024 Akira CVE-2024-40766 Firewall Fog-Ransomware SonicWall SSL-VPN
Akira ransomware continues to evolve https://blog.talosintelligence.com/akira-ransomware-continues-to-evolve/
26/10/2024 13:05:58
QRCode
archive.org
thumbnail

As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group's attack chain, targeted verticals, and potential future TTPs.

talosintelligence EN 2024 Akira analysis ransomware group TTPs
Arctic Wolf Observes Akira Ransomware Campaign Targeting SonicWall SSLVPN Accounts https://arcticwolf.com/resources/blog/arctic-wolf-observes-akira-ransomware-campaign-targeting-sonicwall-sslvpn-accounts/
10/09/2024 08:26:42
QRCode
archive.org
thumbnail

In recent threat activity observed by Arctic Wolf, Akira ransomware affiliates carried out ransomware attacks with an initial access vector involving the compromise of SSLVPN user accounts on SonicWall devices.

arcticwolf EN 2024 SonicWall Akira SSLVPN ransomware CVE-2024-40766
Kasseika Ransomware Deploys BYOVD Attacks Abuses PsExec and Exploits Martini Driver  https://www.trendmicro.com/en_us/research/24/a/kasseika-ransomware-deploys-byovd-attacks-abuses-psexec-and-expl.html
31/01/2024 12:00:59
QRCode
archive.org
thumbnail

In this blog, we detail our investigation of the Kasseika ransomware and the indicators we found suggesting that the actors behind it have acquired access to the source code of the notorious BlackMatter ransomware.  

trendmicro EN 2024 reports ransomware research BYOVD PsExec Kasseika Akira Martini
Follow-On Extortion Campaign Targeting Victims of Akira and Royal Ransomware https://arcticwolf.com/resources/blog/follow-on-extortion-campaign-targeting-victims-of-akira-and-royal-ransomware/
11/01/2024 20:46:01
QRCode
archive.org
thumbnail

Arctic Wolf Labs has investigated several cases where ransomware victims are being targeted for follow-on extortion attempts by threat actors who are aware of ransom attack details.

arcticwolf 2024 Extortion Campaign fake expert ransomware Akira Royal
Decrypted: Akira Ransomware https://decoded.avast.io/threatresearch/decrypted-akira-ransomware/
03/07/2023 07:29:08
QRCode
archive.org
thumbnail

Researchers for Avast have developed a decryptor for the Akira ransomware and released it for public download. The Akira ransomware appeared in March 2023 and since then, the gang claims successful attacks on various organizations in the education, finance and real estate industries, amongst others.

avast EN 2023 Akira decryptor Windows ransomware
Akira Ransomware Extends Reach to Linux Platform https://blog.cyble.com/2023/06/28/akira-ransomware-extends-reach-to-linux-platform/
28/06/2023 14:45:02
QRCode
archive.org
thumbnail

Cyble Research & Intelligence Labs examines the Linux variant of Akira Ransomware and assesses its impact on various sectors.

cyble EN 2023 Akira Ransomware Linux
Akira Ransomware is “bringin’ 1988 back” https://news.sophos.com/en-us/2023/05/09/akira-ransomware-is-bringin-88-back/
12/05/2023 10:55:46
QRCode
archive.org
thumbnail

A new recently observed ransomware family dubbed Akira uses a retro aesthetic on their victim site very reminiscent of the 1980s green screen consoles and possibly takes its namesake from the popular 1988 anime film of the same name.

sophos EN 2023 Akira ransomware analysis
Meet Akira — A new ransomware operation targeting the enterprise https://www.bleepingcomputer.com/news/security/meet-akira-a-new-ransomware-operation-targeting-the-enterprise/
07/05/2023 18:35:50
QRCode
archive.org
thumbnail

The new Akira ransomware operation has slowly been building a list of victims as they breach corporate networks worldwide, encrypt files, and then demand million-dollar ransoms.

Akira Data-Leak-Site Extortion Ransomware Security InfoSec Computer-Security
4737 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio