Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

ShadowSyndicate’s Server Transition Tactics in Ransomware Attacks

February 5, 2026

Buhlmann Group Faces Devastating Ransomware Attack

February 5, 2026

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

February 5, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Akira RaaS Sets Sight on Nutanix VMs, Poses Threat to Key Organizations

Akira RaaS Sets Sight on Nutanix VMs, Poses Threat to Key Organizations

Staff WriterBy Staff WriterNovember 14, 2025No Comments5 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Top Highlights

  1. Imminent Threat: U.S. and European agencies warn that Akira ransomware poses a severe and immediate risk to critical infrastructure, particularly targeting sectors like healthcare and manufacturing.

  2. Rapid Operations: The Akira group is distinguished by its ability to quickly exfiltrate victim data, employing new malware tools and targeting previously underexplored attack surfaces, such as hypervisor technologies.

  3. Shift to New Targets: Akira has expanded its focus to include Nutanix’s Acropolis Hypervisor, aiming at a significant player in the market with 27,000 customers, including critical organizations.

  4. Evolving Tactics: The group exploits known vulnerabilities and utilizes commercial RMM tools to bypass security measures, having amassed nearly $245 million in ransom payments from over a thousand victims.

[gptAs a technology journalist, write a short news story divided in two subheadings, at 12th grade reading level about ‘Akira RaaS Targets Nutanix VMs, Threatens Critical Orgs’in short sentences using transition words, in an informative and explanatory tone, from the perspective of an insightful Tech News Editor, ensure clarity, consistency, and accessibility. Use concise, factual language and avoid jargon that may confuse readers. Maintain a neutral yet engaging tone to provide balanced perspectives on practicality, possible widespread adoption, and contribution to the human journey. Avoid passive voice. The article should provide relatable insights based on the following information ‘

Multiple American and European government agencies warned that recent Akira ransomware activity poses an “imminent threat” to critical infrastructure.

As with most cybercrime groups, the Akira ransomware-as-a-service (RaaS) operation likes to punch down by extorting small and medium-sized businesses (SMBs). It has also gone at bigger fish, in often critical sectors like healthcare, manufacturing, and agriculture.

Highlighting its ongoing threat to critical sectors, the Cybersecurity and Infrastructure Security Agency (CISA), the Department of Health and Human Services (HHS), the FBI, and law enforcement bodies from France, Germany, the Netherlands, and Europol released a joint advisory on Thursday regarding Akira’s latest indicators of compromise (IoC) and tactics, techniques, and procedures (TTPs). Most notably, they pointed out how quickly the group has been exfiltrating victim data, using a variety of new malware tools and software vulnerabilities it has been using, and shifting to a whole new hypervisor attack surface hardly touched by threat actors before it.

In times past, “many observers were slower to recognize Akira as a major threat because an ineffective decryptor released early in its life cycle created a false sense of security, even as the group continued to expand its capabilities and accelerate its operational tempo,” says Cynthia Kaiser, former deputy director of the FBI’s Cybersecurity Division and now senior vice president of Halcyon’s Ransomware Research Center. For at least a couple of years now, though, it has been a top-tier operation, and “one of the faster moving ransomware groups we track,” she says.

Related:Google Looks to Dim ‘Lighthouse’ Phishing-as-a-Service Op

Attackers Discover Nutanix AHV

In its time studying Akira, the team at Arctic Wolf Labs recalls that “what really sets Akira apart is how quickly they can stage a compromised environment for encryption.”

A key enabler, they say, “is their early focus on virtual infrastructure. By gaining control of virtual machine (VM) storage and hypervisor platforms, they can disrupt multiple critical systems at once.” And in this respect, over recent months, Akira has only doubled down.

Historically, Akira has attacked the market-leading hypervisors ESXi (VMware) and Hyper-V (Microsoft). In a June 2025 attack, though, the group encrypted virtual machine disk files associated with a smaller competitor, Nutanix’s Acropolis Hypervisor (AHV).

On its website, Nutanix claims to serve more than 27,000 customers, including organizations in some critical sectors, like the US Navy, Nasdaq, London’s Gatwick airport, and more. Its customers are spread globally, and financial analysts have noted that the company has grown consistently in recent years. They’ve also noted that AHV adoption among those customers sits just shy of 90%. In other words, AHV is a lesser-known but substantial market player, serving more than a few critical organizations.

Related:Data Leak Outs Hacker Students of Iran’s MOIS Training Academy

Not only is AHV a potentially lucrative target for ransomware actors, but it’s also not a place where cybersecurity defenders might be inclined to look. Where ESXi is frequently targeted by hackers — and, to a lesser extent, Hyper-V — Akira appears to be the first major threat actor to aim its sights at AHV.

What Else Is New with Akira

Authorities also recorded a number of other new developments in Akira’s tactics. For instance, it’s been exploiting a handful of known, fixable vulnerabilities in edge devices, including the critical CVE-2024-40711 (Veeam, deserialization of untrusted data) and CVE-2024-40766 (SonicWall, improper access control).

It’s been using commercial remote management and monitoring (RMM) tools like AnyDesk and LogMeIn to perform administrator-type actions in victim networks, primarily for the purpose of undermining security programs like firewalls, antivirus engines, and endpoint detection and response (EDR) platforms.

Related:North Korea’s BlueNoroff Expands Scope of Crypto Heists

A few random malware tools have been cropping in its arsenal, too. Akira actors have been seen using “SystemBC” both as a proxy bot and remote access Trojan (RAT), and the dual threat of “StoneStop” and “PoorTry” — a Windows utility and malicious driver, respectively — for process termination.

As evidence of Akira’s tactical success, authorities noted that the group has sometimes exfiltrated victims’ data in just over two hours’ time. And by late September 2025 — without counting its latest activity — Akira had already collected just shy of $245 million in ransom payments.

The Arctic Wolf Labs team adds that “publicly, more than a thousand total Akira victims are known throughout their tenure. The real number is almost certainly higher.”

‘. Do not end the article by saying In Conclusion or In Summary. Do not include names or provide a placeholder of authors or source. Make Sure the subheadings are in between html tags of

[/gpt3]

Expand Your Tech Knowledge

Learn how the Internet of Things (IoT) is transforming everyday life.

Stay inspired by the vast knowledge available on Wikipedia.

CyberRisk-V1

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAnthropic’s Claude AI Cyberattack Claims Met with Skepticism
Next Article Justice Department Celebrates Breakthroughs in Combating North Korean Cyber Heists
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Comments are closed.

Latest Posts

ShadowSyndicate’s Server Transition Tactics in Ransomware Attacks

February 5, 2026

Buhlmann Group Faces Devastating Ransomware Attack

February 5, 2026

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

February 5, 2026

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026
Don't Miss

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • ShadowSyndicate’s Server Transition Tactics in Ransomware Attacks
  • Buhlmann Group Faces Devastating Ransomware Attack
  • Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses
  • Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems
  • Critical n8n Flaw CVE-2026-25049: Command Execution Risk via Malicious Workflows
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ShadowSyndicate’s Server Transition Tactics in Ransomware Attacks

February 5, 2026

Buhlmann Group Faces Devastating Ransomware Attack

February 5, 2026

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

February 5, 2026
Most Popular

Nokia Alerts Telecoms to Rising Stealth Attacks, DDoS Surge, and Cryptography Pressures

October 8, 20259 Views

Cyberattack Cripples 34 Devices in Telecoms Using LinkedIn Lures & MINIBIKE Malware

September 19, 20259 Views

Tonic Security Secures $7 Million to Transform Cyber Risk Reduction

July 28, 20259 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.