Initial Access & Discovery
- Valid Accounts (T1078)
- Remote System Discovery (T1018)
- Network Share Discovery (T1135)
.akira extension.DFIR analysts tracking Akira intrusions consistently observe a distinct operational pattern mapped to the MITRE ATT&CK framework.
Akira operators heavily rely on compromising perimeter devices. Historically, the US CISA identified their primary vector as the exploitation of Cisco VPN services lacking Multi-Factor Authentication (MFA). For persistence, the group deploys legitimate Remote Monitoring and Management (RMM) tools rather than custom backdoors. Common tools include AnyDesk, RustDesk, and Splashtop.
Once inside, the group utilizes tools like Mimikatz, LaZagne, and Pwdump to dump LSASS memory and extract credentials.
Lateral movement is almost exclusively conducted via the Remote Desktop Protocol (RDP), often utilizing portable RDP clients like mstsc.exe.
Data is exfiltrated prior to encryption to enable double-extortion. Akira operators favor legitimate synchronization tools, most notably Rclone, WinSCP, and FileZilla.
To inhibit system recovery (Defense Evasion), the payload executes vssadmin.exe Delete Shadows /All /Quiet before initiating the encryption sequence.
When responding to a suspected Akira incident (refer to the Ransomware Investigation Playbook), analysts must focus on specific forensic artifacts.
mimikatz.exe, rclone.exe, or unauthorized RMM tools (AnyDesk.exe).vssadmin.exe with shadow deletion parameters.Initial Access & Discovery
Credential Access & Lateral Movement
Exfiltration & Impact