New Ransomware Strain Could Be Costing Businesses Millions

Akira’s tactics closely resemble those of other ransomware threat actors. They typically exploit vulnerabilities in hardware or software, or employ phishing techniques to gain access to a corporate network. Once inside, they move laterally across devices, stealing sensitive files and deploying the ransomware to all endpoints on the network. Payment is typically demanded in cryptocurrency.