- Ransom Total: $248.9 million from 321 victims, mostly US firms in tech, finance, healthcare since May 2023.
- Tactics: Double extortion, encrypts files, steals data for leaks if unpaid; targets Windows via VPN flaws or weak passwords.
- Scale: 43 incidents in past year, up from 23 in 2024; FBI ties it to Asia-based RaaS model, expanding globally.
- Advice: Patch VPNs, enforce MFA; report to FBI, gang leaks data on Tor sites to pressure payouts.
The FBI stepped up this week with a stark warning about the Akira ransomware crew, who have raked in almost $250 million from hundreds of victims since popping up in mid-2023. This Asia-based gang runs a slick ransomware-as-a-service setup, hitting mostly US companies in sectors like IT, manufacturing, and finance. Their playbook, locking files and threatening to dump stolen data, has proven deadly effective, with 43 attacks just in the last year alone. It’s a reminder that these groups aren’t fading; they’re evolving, making quick cash from vulnerabilities that should be patched yesterday.
Akira favors Windows systems, slipping in through unpatched VPNs or stolen credentials, then encrypting data and exfiltrating sensitive files before the victim even notices. If you don’t pay, they post it on their Tor leak site, names, contracts, you name it, to twist the knife. The FBI’s tally shows 321 victims total, with 80% in the US, and that $248.9 million figure likely lowballs it since many don’t report or pay quietly. Recent waves hit 43 orgs in 2025, double last year’s count, as the gang scales up with affiliates worldwide.
Experts like those at Recorded Future track Akira’s growth from a small player to a major earner, using custom malware and double extortion to maximize fear. Payouts in Bitcoin keep it untraceable, and the FBI urges reporting to help map their network, IC3 tips line is flooded, but intel saves others. On Twitter, cybersecurity folks are sharing the alert, one post noting “Akira’s making LockBit look amateur, pay up or leak out.”
Defenders, the FBI says patch those VPNs and roll out multi-factor auth everywhere, Akira loves the low-hanging fruit. With RaaS models like this, one good exploit kit sells to dozens, so staying vigilant could keep your name off the leak list. This haul cements Akira as a top threat, outpacing some old-timers in speed and scale.
Stay sharp, ransomware doesn’t sleep, and neither should your defenses.
Other Resources
FBI Tracks Akira Ransoms | Reuters on Gang Tactics | Bleeping Computer Leak Sites









![Online Scam Cases Continue to Rise Despite Crackdowns on Foreign Fraud Networks [Myanmar] Online Scam Cases Continue to Rise Despite Crackdowns on Foreign Fraud Networks [Myanmar]](https://sumtrix.com/wp-content/uploads/2025/06/30-12-120x86.jpg)




