Live
Black Hat USADark ReadingBlack Hat AsiaAI BusinessWhy Developer Productivity Engineering is UnderratedDEV CommunityMatrices in PythonDEV CommunityUse OpenClaw to Make a Personal AI AssistantTowards AIQodo vs Sourcery: AI Code Review Approaches Compared (2026)DEV CommunityCreating a 50 GB Swap File on Jetson AGX Orin (Root on NVMe)DEV CommunityFrom Redis to Valkey: pre-migration Reconnaissance — detect all apps & connections in realtimeDEV CommunityMuri: The Root Cause of OverburdenDEV CommunityStop Guessing What Caused Your Flaky Tests Fail or PassDEV CommunityMura: The Source of Uneven FlowDEV Community🚀 The Developer Who Survives 2026 Is NOT the One You ThinkDEV CommunityThe UK government reportedly wants Anthropic to expand its presence in LondonEngadget"Open the Fuckin' Strait": Trump threatens to start bombing civilian infrastructure TuesdayAxios TechBlack Hat USADark ReadingBlack Hat AsiaAI BusinessWhy Developer Productivity Engineering is UnderratedDEV CommunityMatrices in PythonDEV CommunityUse OpenClaw to Make a Personal AI AssistantTowards AIQodo vs Sourcery: AI Code Review Approaches Compared (2026)DEV CommunityCreating a 50 GB Swap File on Jetson AGX Orin (Root on NVMe)DEV CommunityFrom Redis to Valkey: pre-migration Reconnaissance — detect all apps & connections in realtimeDEV CommunityMuri: The Root Cause of OverburdenDEV CommunityStop Guessing What Caused Your Flaky Tests Fail or PassDEV CommunityMura: The Source of Uneven FlowDEV Community🚀 The Developer Who Survives 2026 Is NOT the One You ThinkDEV CommunityThe UK government reportedly wants Anthropic to expand its presence in LondonEngadget"Open the Fuckin' Strait": Trump threatens to start bombing civilian infrastructure TuesdayAxios Tech
AI NEWS HUBbyEIGENVECTOREigenvector

Akira Hackers Shrink Encryption Timeline to Under One Hour

Digit.fyiby Tom QuinnApril 3, 20263 min read2 views
Source Quiz
🧒Explain Like I'm 5Simple language

Hey there, superstar! Imagine you have a special toy box, and inside are all your favorite toys.

Now, there are some naughty people called "Akira Hackers." They're like super-fast tricksters! They found a secret, wobbly spot in some toy boxes (computers) that weren't fixed yet.

They can sneak in super-duper fast, sometimes in just one hour! It's like they can lock your toy box with a magic lock almost instantly. They don't even lock all your toys, just enough so you can't play until someone helps unlock it.

It's important to keep our toy boxes safe and strong, like having a super-hero guard, so these tricksters can't get in so easily!

A notorious ransomware group has been observed leveraging long‑standing exploits and stolen credentials to slip past MFA protections and execute attacks in as little as one hour. Tracking the well-known Akira ransomware group, security researchers from Halcyon witnessed hackers abusing CVE-2024-40766 to gain unauthorised access to SonicWall management interfaces and configuration backups on unpatched devices. [ ] The post Akira Hackers Shrink Encryption Timeline to Under One Hour appeared first on DIGIT .

A notorious ransomware group has been observed leveraging long‑standing exploits and stolen credentials to slip past MFA protections and execute attacks in as little as one hour.

Tracking the well-known Akira ransomware group, security researchers from Halcyon witnessed hackers abusing CVE-2024-40766 to gain unauthorised access to SonicWall management interfaces and configuration backups on unpatched devices.

They then brute‑forced the MySonicWall Cloud Backup API to steal customer configuration files, which held encrypted credentials, which were cracked offline, providing hackers with valid usernames and passwords – some of which had never been reset even on patched hardware.

Recovery codes and plaintext credentials found in these environments allowed threat actors to bypass MFA entirely, letting them log in to portals as if they were legitimate users

Detailing the hackers’ methods, Halcyon warned that this foothold “rapidly cascades into full domain compromise and the exposure of virtually every sensitive data type in the target environment”, with typical attacks taking less than four hours from initial access to encryption.

This speed is down to Akira’s “intermittent encryption” method, where hackers divide large files into blocks, then encrypt only a portion of each block, leaving the rest unencrypted. In one instance, this tactic allowed the group to shrink the time from access to encryption to just one hour.

While this is not a new threat, with SonicWall connecting it to an earlier 2024 CVE and releasing mitigation guidance in relation to CVE-2024-40766 in August last year, Akira have used this first point of compromise to speed up its attacks, with Halcyon saying it has allowed the group to compromise hundreds of victims in the last twelve months.

In January, a study by ReliaQuest found that Akira was one of the most prolific ransomware groups of Q4’2025, claiming over 200 victims, with separate reports indicating that the group demands initial ransoms averaging $925,666.

Recommended reading

  • Data Theft Surges to 96% of Ransomware Attacks

  • Comment | The History of Ransomware

  • Ransomware “Supergroups” Emerge After Record‑Breaking Year of Attacks

With the prospect of a potential million-dollar payout, Halcyon is urging firms to adopt a layered defence, aligned with mitigating most common ransomware methods.

Organisations should begin by hardening initial access vectors, focusing on exposure from trusted sources and third-party pathways, and look to limit lateral movement and credential abuse through continuous monitoring of remote services and valid accounts.

“Akira’s combination of rapid compromise capabilities, disciplined operational tempo, and investment in reliable decryption infrastructure sets it apart from many ransomware operators,” concluded Halcyon’s researchers.

“Organisations that have not yet addressed exposed VPN appliances, legacy credential hygiene, and gaps in MFA enforcement remain at significant risk. Defenders should treat Akira not as an opportunistic threat, but as a capable, persistent adversary that will exploit every available weakness to reach its objective.”

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by Eigenvector · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

Knowledge Map

Knowledge Map
TopicsEntitiesSource
Akira Hacke…interfaceresearchDigit.fyi

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 139 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Products