![]() ![]() ![]() In this blog post, we will compare two separate incident attack flows, illustrating how different threat actors are deploying Akira ransomware. Figure 3: Timeline analysis of Akira victims While the total number of victim organizations (Figure 3) are still relatively small in comparison to Lockbit or BlackCat/APLHV, that is how all new ransomware families begin. ![]() However, cool as their leak site design may be, this matters none to victims of this ransomware, which regrettably includes a daycare service in Canada. ![]()
0 Comments
Leave a Reply. |