Dear Everyone,
Today, Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation, Department of Defense Cyber Crime Center, Department of Health and Human Services, and international partners, released an updated joint Cybersecurity Advisory, StopRansomware: Akira Ransomware, to provide network defenders with the latest indicators of compromise, tactics, techniques, and procedures, and detection methods associated with Akira ransomware activity.
This advisory reflects new findings as of Nov. 13, 2025, highlighting Akira ransomware’s evolution and continued threat to critical infrastructure sectors. Akira ransomware threat actors, associated with groups such as Storm-1567, Howling Scorpius, Punk Spider, and Gold Sahara, have expanded their capabilities, targeting small and medium-sized businesses as well as larger organizations across sectors including Manufacturing, Educational Institutions, Information Technology, Healthcare, Financial, and Food and Agriculture.
Key Updates:
CISA and its partners strongly encourage organizations to apply patches for known vulnerabilities, especially those affecting VPN products and backup servers, and enforce multifactor authentication for all remote access services. Organizations should monitor unauthorized domain account creation and unusual network activity while deploying endpoint detection and response solutions to enhance security.
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-109a?utm_source=https://www.cisa.gov/...
@Kyaw_Myo_Oo Interesting. A recent ISC2 article quoted the FBI as identifying extortionware as more of a threat now than ransomware. I am more concerned about the one that is not interested in money which is killware. No profit in trying to eliminate it like these others.
Thanks for the post.
I believe that the naming conventions no longer matter. In this case when they are targeting Manufacturing, etc., they all have the ability to become killware as the results in Critical Infrastructure are not easy to predict.
Depending on the manufacturing, HealthCare, etc. environments. disruption might have serious consequences. While the initial intent might be money, the results could cost the lost of life.
As an example, consider a water purification plant that is hit with ransomware that suddenly stops a certain chemical process from happening *water is now toxic) or a steel manufacturer where the line of molten steel is suddenly frozen or doesn't stop where it is supposed to and overflows on plant floors, or the piece of medical equipment pumping much needed drugs that suddenly stops.
One of the remediation steps is to remediate known vulnerabilities, this sometimes difficult (actually close to impossible) due to the criticality of the critical infrastructure, This can be difficult as production lines need have maximum uptimes and cannot be taken down to patch which is why I recommend (personal opinion only), considering internal firewalls.
I personally am not a fan of names for malware
d