与俄罗斯黑客绑在一起的Akira赎金软件正以Nutanix系统为目标,索要赎金,自2025年9月以来已收缴2.44亿美元。
Akira ransomware, tied to Russian hackers, is targeting Nutanix systems, demanding ransom, and has collected $244 million since September 2025.
与俄罗斯网络罪犯有联系的Akira赎金软件组正在以Nutanix AHV虚拟机器为目标,不断升级攻击,从先前对VMware和Hyper-V.的焦点扩大,利用SonicWall VPNS的CVE 2024-40766等弱点和未插入的Veeam服务器,该组使用密码喷洒、SSH利用和窃取证书获得访问权限,然后横向地对数据进行加密。
The Akira ransomware group, linked to Russian cybercriminals, is escalating attacks by targeting Nutanix AHV virtual machines, expanding from prior focus on VMware and Hyper-V. Exploiting vulnerabilities like CVE-2024-40766 in SonicWall VPNs and unpatched Veeam servers, the group uses password spraying, SSH exploitation, and stolen credentials to gain access, then moves laterally to encrypt data.
自2025年9月下旬以来,Akira已获得2.44亿美元的赎金。
Since late September 2025, Akira has generated $244 million in ransom payments.
美国独联体国家安全局、联邦调查局和欧洲合作伙伴警告医疗、金融、政府和关键基础设施不断受到威胁,敦促立即修补、强有力的出入控制、离线备份以及恢复计划的测试。
The U.S. CISA, FBI, and European partners warn of ongoing threats to healthcare, finance, government, and critical infrastructure, urging immediate patching, strong access controls, offline backups, and testing of recovery plans.