Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New Phishing Platform Used in Credential Theft Campaigns

April 3, 2026

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

April 3, 2026

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

April 3, 2026
Facebook X (Twitter) Instagram
Friday, April 3
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Researchers Observe Sub-One-Hour Ransomware Attacks
News

Researchers Observe Sub-One-Hour Ransomware Attacks

Team-CWDBy Team-CWDApril 3, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security researchers have warned of another step change in the velocity of ransomware, after spotting the Akira group complete all stages of an attack within an hour.

Halcyon said in a new report that Akira usually achieves initial access by exploiting vulnerabilities in internet-facing VPN appliances and backup solutions, especially those lacking multi-factor authentication (MFA).

In the past, these have included devices from SonicWall, Veeam and Cisco, although the group has also been observed using credential theft, spearphishing, password spraying, and even initial access brokers (IABs).

It is one of the more sophisticated groups out there, with suspected former Conti hackers now engaged in operations.

Read more on ransomware velocity: Ransomware Gangs Increasingly Prioritize Speed and Volume in Attacks.

Following initial access, Akira usually exfiltrates data prior to encryption – following a classic double-extortion model. Threat actors try to evade detection by disabling security software, and then use living-off-the-land approaches (eg FileZilla, WinRAR, WinSCP and RClone) for data staging and encryption, the report explained.

A Focus on Speed

Halcyon said Akira manages to complete an entire attack lifecycle in under four hours, and in some cases less than one hour without detection.

This is because it is “more stealthy and less aggressive” than other groups such as Play, the report claimed. Zero-day exploits and compromised credentials enable covert access while intermittent encryption speeds up the process of scrambling victims’ files.

“Akira is known to set encryption to as low as 1% of a file and push to all devices to maximize impact in a short duration,” Halcyon said.

“Akira’s combination of rapid compromise capabilities, disciplined operational tempo, and investment in reliable decryption infrastructure sets it apart from many ransomware operators.”

This has enabled the group to generate as much as $244m since it appeared in March 2023, according to the US government.

How to Protect the Organization

Halcyon urged organizations to adopt layered defenses to mitigate the threat from Akira and other ransomware groups. This includes: 

  • Hardening against initial access, including “trusted relationships” and “third-party access pathways”
  • Limiting lateral movement and credential abuse by restricting remote services and misuse of accounts
  • Detecting data staging and exfiltration by monitoring for archive-collected data and command-and-control channels
  • Protecting against encryption impact through tested recovery processes
  • Deploying a dedicated anti-ransomware solution that blocks malicious binaries pre-execution, detects runtime behaviors and exfiltration efforts, prevents tampering and network intrusion, and protects backup integrity



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe Kill Chain Is Obsolete When Your AI Agent Is the Threat
Next Article GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data
Team-CWD
  • Website

Related Posts

News

New Phishing Platform Used in Credential Theft Campaigns

April 3, 2026
News

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

April 3, 2026
News

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

April 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Top IRS scams to look out for in 2026

February 10, 2026

A quick guide to recovering a hacked account

March 21, 2026

Your information is on the dark web. What happens next?

January 13, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.