Skip to main content
Skip to main content
Microsoft Security Intelligence
7 entries found.
Updated on May 01, 2024

Ransom:Win32/Akira.A is the detection name for a 64-bit Windows version of the Akira ransomware, a persistent threat active since March 2023. This malware operates on a Ransomware-as-a-Service (RaaS) model, which allows multiple threat actors to conduct widespread attacks. Its primary method is a double-extortion strategy: threat actors first exfiltrate sensitive data from compromised networks and then deploy a payload to encrypt files on Windows devices. 

This operation poses a significant threat to enterprise environments. Threat actors gain initial access to networks by exploiting known vulnerabilities in VPN appliances. They also use stolen credentials for Remote Desktop Protocol (RDP) and conduct sophisticated phishing campaigns. After infiltration, they move to steal data before launching the file-encryption routine. They threaten to publish the stolen information on their dark web leak site to pressure victims into paying the ransom, making data recovery and breach containment critical priorities for affected organizations. 

Alert level: severe
Updated on Nov 03, 2023

Ransom:Win32/Akira!MTB is the detection name for a 32-bit Windows version of the Akira ransomware, a persistent threat active since March 2023. This malware operates on a Ransomware-as-a-Service (RaaS) model, which allows multiple threat actors to conduct widespread attacks. Its primary method is a double-extortion strategy: threat actors first exfiltrate sensitive data from compromised networks and then deploy a payload to encrypt files on Windows devices. 

This operation poses a significant threat to enterprise environments. Threat actors gain initial access to networks by exploiting known vulnerabilities in VPN appliances. They also use stolen credentials for Remote Desktop Protocol (RDP) and conduct sophisticated phishing campaigns. After infiltration, they move to steal data before launching the file-encryption routine. They threaten to publish the stolen information on their dark web leak site to pressure victims into paying the ransom, making data recovery and breach containment critical priorities for affected organizations. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Akira family.  

Alert level: severe
Updated on Apr 17, 2024

Ransom:Win32/Akira!sms is the detection name for a Win32 version of the Akira ransomware, a persistent threat active since March 2023. This malware operates on a Ransomware-as-a-Service (RaaS) model, which allows multiple threat actors to conduct widespread attacks. Its primary method is a double-extortion strategy: threat actors first exfiltrate sensitive data from compromised networks and then deploy a payload to encrypt files on Windows devices. 

This operation poses a significant threat to enterprise environments. Threat actors gain initial access to networks by exploiting known vulnerabilities in VPN appliances. They also use stolen credentials for Remote Desktop Protocol (RDP) and conduct sophisticated phishing campaigns. After infiltration, they move to steal data before launching the file-encryption routine. They threaten to publish the stolen information on their dark web leak site to pressure victims into paying the ransom, making data recovery and breach containment critical priorities for affected organizations. 

Alert level: severe
Updated on May 20, 2025

Ransom:Win32/Akira!rfn is the detection name for a Win32 version of the Akira ransomware, a persistent threat active since March 2023. This malware operates on a Ransomware-as-a-Service (RaaS) model, which allows multiple threat actors to conduct widespread attacks. Its primary method is a double-extortion strategy: threat actors first exfiltrate sensitive data from compromised networks and then deploy a payload to encrypt files on Windows devices. 

This operation poses a significant threat to enterprise environments. Threat actors gain initial access to networks by exploiting known vulnerabilities in VPN appliances. They also use stolen credentials for Remote Desktop Protocol (RDP) and conduct sophisticated phishing campaigns. After infiltration, they move to steal data before launching the file-encryption routine. They threaten to publish the stolen information on their dark web leak site to pressure victims into paying the ransom, making data recovery and breach containment critical priorities for affected organizations. 

Alert level: severe
Updated on May 23, 2023

Ransom:Win32/Akira.A!ibt is the detection name for a Win32 version of the Akira ransomware, a persistent threat active since March 2023. This malware operates on a Ransomware-as-a-Service (RaaS) model, which allows multiple threat actors to conduct widespread attacks. Its primary method is a double-extortion strategy: threat actors first exfiltrate sensitive data from compromised networks and then deploy a payload to encrypt files on Windows devices. 

This operation poses a significant threat to enterprise environments. Threat actors gain initial access to networks by exploiting known vulnerabilities in VPN appliances. They also use stolen credentials for Remote Desktop Protocol (RDP) and conduct sophisticated phishing campaigns. After infiltration, they move to steal data before launching the file-encryption routine. They threaten to publish the stolen information on their dark web leak site to pressure victims into paying the ransom, making data recovery and breach containment critical priorities for affected organizations. 

Alert level: severe
Updated on Apr 18, 2024

Ransom:Win32/Akira.B!ibt is the detection name for a Win32 version of the Akira ransomware, a persistent threat active since March 2023. This malware operates on a Ransomware-as-a-Service (RaaS) model, which allows multiple threat actors to conduct widespread attacks. Its primary method is a double-extortion strategy: threat actors first exfiltrate sensitive data from compromised networks and then deploy a payload to encrypt files on Windows devices. 

This operation poses a significant threat to enterprise environments. Threat actors gain initial access to networks by exploiting known vulnerabilities in VPN appliances. They also use stolen credentials for Remote Desktop Protocol (RDP) and conduct sophisticated phishing campaigns. After infiltration, they move to steal data before launching the file-encryption routine. They threaten to publish the stolen information on their dark web leak site to pressure victims into paying the ransom, making data recovery and breach containment critical priorities for affected organizations. 

Alert level: severe
Updated on Nov 11, 2025

Ransom:Win32/AkiraRansomNote!MTB is the detection name for a Win32 version of the Akira ransomware, a persistent threat active since March 2023. This malware operates on a Ransomware-as-a-Service (RaaS) model, which allows multiple threat actors to conduct widespread attacks. Its primary method is a double-extortion strategy: threat actors first exfiltrate sensitive data from compromised networks and then deploy a payload to encrypt files on Windows devices. 

This operation poses a significant threat to enterprise environments. Threat actors gain initial access to networks by exploiting known vulnerabilities in VPN appliances. They also use stolen credentials for Remote Desktop Protocol (RDP) and conduct sophisticated phishing campaigns. After infiltration, they move to steal data before launching the file-encryption routine. They threaten to publish the stolen information on their dark web leak site to pressure victims into paying the ransom, making data recovery and breach containment critical priorities for affected organizations. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Akira family.   

Alert level: severe