Frequently Asked Questions

Akira Ransomware Threat & Tactics

What is Akira Ransomware and why is it a significant threat?

Akira Ransomware is a cybercriminal operation that has targeted over 250 organizations across North America, Europe, and Australia since March 2023, extorting more than million in ransom payments. It is notable for its use of double extortion tactics—exfiltrating sensitive data and encrypting critical systems, then threatening to leak data if the ransom is not paid. Akira is believed to have ties to the former Conti ransomware group and operates using a ransomware-as-a-service (RaaS) model, enabling rapid scaling and frequent attacks. CISA Alert AA24-109A (April 18, 2024) provides further details.

How does Akira Ransomware typically gain access to organizations?

Akira threat actors gain initial access by exploiting known VPN vulnerabilities (such as Cisco), leveraging the absence of multi-factor authentication (MFA), conducting spear phishing campaigns, and using stolen credentials to infiltrate networks. Once inside, they compromise domain controllers, establish persistence, and conduct reconnaissance to identify high-value systems for exfiltration and encryption.

What are double extortion tactics used by Akira?

Double extortion involves exfiltrating sensitive data before encrypting critical systems. Victims are then pressured to pay a ransom to receive decryption keys. If the ransom is not paid, the stolen data is leaked on Akira’s darknet site, increasing the impact and urgency for organizations to respond.

How quickly did Cymulate respond to the CISA alert about Akira Ransomware?

When CISA issued the cybersecurity alert on April 18, 2024, Cymulate’s Threat Research Group responded within three days by adding an immediate threat simulation to the Cymulate platform. This allowed organizations to test their exposure to Akira Ransomware using up-to-date tactics and techniques in a production-safe environment.

What were the key findings from Cymulate’s Akira Ransomware simulations?

Cymulate’s simulations revealed a 52% average penetration ratio, indicating Akira’s sophisticated tactics can bypass many web gateways and endpoint security solutions. Some organizations achieved a 0% penetration ratio, successfully blocking all tested payloads, while others identified critical gaps with 100% penetration. Organizations that took remediation actions reduced their exposure by an average of 30 basis points within 30 days of their initial assessment.

How does Cymulate help organizations validate their exposure to Akira Ransomware?

Cymulate enables organizations to simulate Akira Ransomware attacks in a safe, controlled environment. The platform delivers malicious payloads associated with Akira, validates whether security controls block or allow them, and provides actionable mitigation guidance and indicators of compromise (IOCs) to address vulnerabilities and improve defenses.

What proactive steps does Cymulate recommend to prevent an Akira breach?

Cymulate recommends simulating Akira Ransomware attacks to identify weaknesses, applying mitigation guidance to close security gaps, and implementing automated security validation to adapt to evolving threats. Continuous validation ensures that security controls are effective and up-to-date against the latest tactics.

How often does Cymulate update its threat simulations?

The Cymulate Threat Research Group monitors the threat intelligence community and loads new immediate threat simulations into the Cymulate platform daily. Customers who configure immediate threats for auto-run automatically validate their security controls against new threats and receive notifications of any exposures.

What is the impact of not validating security controls against Akira Ransomware?

Organizations that do not validate their security controls risk being unable to detect or prevent Akira Ransomware attacks. Victims in the past 18 months had controls that failed to protect their data, resulting in breaches, data exfiltration, and ransom demands. Continuous validation is essential to avoid becoming the next victim.

How does Cymulate’s simulation process work for Akira Ransomware?

The simulation process involves delivering Akira-associated payloads in a safe, controlled manner, then validating whether security controls block or allow these payloads. The results help organizations identify gaps and take remediation actions to strengthen their defenses.

What metrics does Cymulate provide to measure exposure to Akira Ransomware?

Cymulate provides metrics such as penetration ratios (e.g., 52% average, 0% for some organizations), exposure reduction rates (e.g., 30 basis points within 30 days), and detailed reports on which payloads were blocked or allowed. These metrics help organizations quantify their risk and track improvements over time.

How does Cymulate’s continuous validation contribute to cyber resilience?

Continuous validation ensures that security controls are always tested against the latest threats, allowing organizations to adapt quickly and maintain a strong security posture. Automated, daily updates and immediate threat simulations help organizations stay ahead of evolving ransomware tactics like those used by Akira.

What are the main recommendations for organizations concerned about Akira Ransomware?

Organizations should simulate Akira Ransomware attacks, apply mitigation guidance, implement automated security validation, and continuously monitor for new threats. These steps help identify and remediate weaknesses before attackers can exploit them.

How does Cymulate’s platform help with remediation after identifying exposure to Akira?

Cymulate provides actionable mitigation guidance and indicators of compromise (IOCs) to help organizations address vulnerabilities identified during simulations. By following these recommendations, organizations can reduce their exposure and strengthen their defenses against Akira and similar threats.

What is the benefit of configuring Cymulate’s immediate threats for auto-run?

Configuring immediate threats for auto-run ensures that your security controls are automatically validated against the latest threats as soon as they are added to the Cymulate platform. This proactive approach provides timely notifications of any exposures, enabling rapid response and remediation.

How does Cymulate’s approach differ from traditional security validation methods?

Cymulate offers automated, continuous threat simulations and validation, whereas traditional methods often rely on point-in-time assessments or manual penetration tests. This enables organizations to stay ahead of evolving threats like Akira Ransomware and maintain a resilient security posture with less manual effort.

Where can I find more resources on ransomware resilience and email gateway validation?

You can find practical guides and blog posts such as '7 Essential Steps to Becoming Ransomware Resilient' and 'Relieving Stress from Email-based Threats' in Cymulate’s Resource Hub. These resources provide actionable steps to reduce ransomware risk and optimize defenses.

How can I learn more about Cymulate’s Exposure Validation solution?

To learn more about Cymulate Exposure Validation, visit the Exposure Validation solution brief or schedule a personalized demo via the Cymulate website.

Features & Capabilities

What are the key capabilities of Cymulate’s platform for ransomware defense?

Cymulate’s platform offers continuous threat validation, automated attack simulations, exposure prioritization, and actionable remediation guidance. It simulates real-world ransomware attacks, including Akira, and provides metrics to measure and reduce exposure. The platform is updated daily with new threat simulations and integrates with existing security controls for automated mitigation.

Does Cymulate integrate with other security technologies?

Yes, Cymulate integrates with a wide range of security technologies, including Akamai Guardicore (network security), AWS GuardDuty (cloud security), BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a complete list, visit the Partnerships and Integrations page.

How easy is it to implement Cymulate and start testing?

Cymulate is designed for rapid, agentless deployment with no need for additional hardware or complex configurations. Customers can start running simulations almost immediately after deployment. The platform offers comprehensive support, including email, chat, knowledge base, webinars, and an AI chatbot for quick onboarding and troubleshooting.

What feedback have customers given about Cymulate’s ease of use?

Customers consistently praise Cymulate for its intuitive, user-friendly interface and actionable insights. Testimonials highlight the platform’s ease of implementation, accessible support, and the ability to quickly identify and remediate security gaps. For example, Raphael Ferreira, Cybersecurity Manager, noted, “Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights into how you can improve your security posture.”

What security and compliance certifications does Cymulate hold?

Cymulate holds several industry-leading certifications, including SOC2 Type II (covering security, availability, confidentiality, and privacy), ISO 27001:2013 (Information Security Management), ISO 27701 (Privacy Information Management), ISO 27017 (Cloud Services Security Controls), and CSA STAR Level 1. These certifications demonstrate Cymulate’s commitment to robust security and compliance standards. Learn more.

How does Cymulate ensure data security and privacy?

Cymulate ensures data security through encryption for data in transit (TLS 1.2+) and at rest (AES-256), secure AWS-hosted data centers, a tested disaster recovery plan, and a strict Secure Development Lifecycle (SDLC). The platform also includes mandatory 2-Factor Authentication (2FA), Role-Based Access Controls (RBAC), and IP address restrictions. Cymulate is GDPR-compliant and has a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO).

What is Cymulate’s pricing model?

Cymulate operates on a subscription-based pricing model tailored to each organization’s requirements. Pricing depends on the chosen package, number of assets, and scenarios selected for testing and validation. For a detailed quote, organizations can schedule a demo with the Cymulate team.

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs and security leaders, SecOps teams, Red Teams, and Vulnerability Management teams across organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. The platform delivers measurable improvements in threat resilience, operational efficiency, and alignment of security strategies with business goals.

What core problems does Cymulate solve for security teams?

Cymulate addresses challenges such as overwhelming threat volumes, lack of visibility, unclear risk prioritization, and resource constraints. It provides continuous threat validation, exposure prioritization, improved resilience, operational efficiency, and collaboration across security teams.

How does Cymulate help organizations prioritize and remediate exposures?

The platform validates exploitability and ranks exposures based on prevention and detection capabilities, business context, and threat intelligence. This enables organizations to focus on the most critical vulnerabilities and take targeted remediation actions.

What measurable outcomes have customers achieved with Cymulate?

Customers have reported a 52% reduction in critical exposures, a 60% increase in team efficiency, and an 81% reduction in cyber risk within four months. For example, Hertz Israel reduced cyber risk by 81% in four months using Cymulate. Read the case study.

Are there case studies showing Cymulate’s effectiveness against ransomware?

Yes, Cymulate’s case studies include organizations like Hertz Israel, which reduced cyber risk by 81% in four months, and Nemours Children’s Health, which improved detection and response in hybrid and cloud environments. Explore more at the Cymulate Case Studies page.

How does Cymulate’s solution differ for different security personas?

Cymulate tailors its solutions for CISOs (providing metrics and risk prioritization), SecOps teams (automating processes and improving efficiency), Red Teams (offensive testing with a large attack library), and Vulnerability Management teams (automated validation and prioritization). Each persona benefits from features designed for their specific challenges. Learn more on the CISO, SecOps, Red Teaming, and Vulnerability Management pages.

What are the main pain points Cymulate addresses for organizations facing ransomware threats?

Cymulate addresses fragmented security tools, resource constraints, unclear risk prioritization, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies in vulnerability management, and post-breach recovery challenges. The platform provides unified, automated, and actionable solutions for each pain point.

How does Cymulate’s approach compare to traditional penetration testing?

Unlike traditional penetration testing, which is often manual and point-in-time, Cymulate provides automated, continuous, and production-safe simulations. This enables organizations to validate their defenses against the latest threats, including Akira Ransomware, and respond more quickly to emerging risks.

Where can I find Cymulate’s latest research, news, and events?

You can stay updated with Cymulate’s latest research, news, and events by visiting the Blog, Newsroom, and Events & Webinars pages.

Where can I access Cymulate’s Resource Hub for insights and product information?

All of Cymulate’s resources, including insights, thought leadership, and product information, are available in the Resource Hub.

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Akira Ransomware: How to Test and Validate Your Exposure

By: Brian Moran, VP of Product Marketing

Last Updated: December 30, 2025

ransomware

Akira Ransomware is back in the headlines after the threat group published a record number of new victims' data on their darknet leak site last Monday. Cymulate first became aware of Akira back in 2023 when they appeared on our radar on multiple occasions and then again on April 18, 2024, when CISA issued the Cybersecurity Alert:

#StopRansomware: Akira Ransomware (Alert Code: AA24-109A)

According to CISA, Akira Ransomware has impacted a wide range of businesses and critical infrastructure entities in North America, Europe and Australia since March 2023. The threat group is responsible for attacks against some 250 organizations (many of which were small to medium sized businesses) and extorting over $42 million in ransom payments.

Akira is believed to have ties to the former Conti ransomware group, employing a ransomware-as-a-service (RaaS) model to scale their operations. Their latest data leaks indicate a possible partnership with new affiliates, leveraging RaaS to target an increasing pool of victims.

akira ransomware

Akira Uses Double Extortion Tactics

  • Exploiting known VPN vulnerabilities (e.g., Cisco).
  • Absence of multi-factor authentication (MFA).
  • Spear phishing campaigns.
  • Stolen credentials to infiltrate networks.
  • Compromise domain controllers to create new domain accounts.
  • Establish persistence and conduct reconnaissance.
  • Identify high-value systems for exfiltration and encryption.
  • Exfiltrate sensitive data and encrypt critical systems.
  • Pay ransom to receive encryption keys.
  • Refuse to pay ransom and have stolen data leaked to Akira’s darknet site.

Akira recently leaked data from over 30 victims in a single week, marking a sharp rise in their threat activity.

Are Your Security Controls Ready for Akira Ransomware?

Many organizations who follow the cyber headlines and see themselves as a potential target in the cross hairs of Akira will be asking themselves the question: Are we exposed?

Given Akira’s sophisticated tactics and techniques, answering this question with conviction is going to test the resolve of any CISO who is willing to speculate that their security controls are indeed configured and tuned to stop this attack.

Cymulate enables organizations to answer this question with confidence. Over the past year, Cymulate has tracked Akira Ransomware and continuously updated threat simulations to help customers test and validate their exposure to this evolving threat.

akira immediate threats

Simulating Akira Ransomware Attacks

When CISA issued the cybersecurity alert on April 18, 2024, the Cymulate Threat Research Group responded quickly, adding an immediate threat simulation to the Cymulate platform within three days. This simulation allowed organizations to test their exposure to Akira Ransomware by replicating the tactics and techniques used by the threat group in a production-safe environment.

How the Simulation Works

  • Malicious payload delivery: The simulation sends payloads associated with Akira ransomware in a safe, controlled manner.
  • Validation of security controls: It evaluates whether these payloads are blocked or if they penetrate existing defenses to compromise systems.

Key Findings

  • 52% average penetration ratio: This figure highlights the evolving sophistication of Akira's tactics and their ability to penetrate web gateways and endpoint security solutions in many organizations.
  • 100% effectiveness for some customers: Several organizations achieved a 0% penetration ratio, successfully blocking all tested payloads. These results provided clear evidence of effective security configurations and no exposure to Akira ransomware.
  • Reduced exposure for many: Customers with penetration ratios below 33% managed to block most of the payloads, significantly lowering their risk of compromise.
  • Critical gaps identified: Organizations with 100% penetration ratios recognized critical security gaps. Using Cymulate’s mitigation guidance and IOCs, these customers can address vulnerabilities and improve defenses against future attacks.
  • Remediation actions reduce exposure: Organizations who undertook remediation actions were able to reduce their exposure by an average of 30 basis points within 30 days of conducting their initial assessment.
akira penetration ratio data

Continuous Validation: The Key to Cyber Resilience

The Cymulate Threat Research Group monitors the threat intelligence community and loads new immediate threat simulations into the Cymulate platform on a daily basis. Customers who configure immediate threats for auto-run will automatically validate their security controls against new threats and receive notifications any time they have exposure to a threat.

Organizations invest significant time and money when implementing and managing multiple layers of security controls to keep them protected. To keep up with the constantly evolving threat landscape and the latest threat tactics, you need to continuously validate the effectiveness of your controls by simulating the latest immediate threats and attack scenarios. This is the only way to truly know if your controls are operating as intended and doing their job effectively.

Proactive Steps to Prevent an Akira Breach

Unfortunately, organizations who fell victim to Akira Ransomware in the last 18 months had security controls that failed to protect their data. For those organizations that seek more proactive security measures to avoid becoming the next victim, we recommend:

  • Simulating Akira Ransomware attacks to identify weaknesses in your defenses.
  • Applying mitigation guidance to close security gaps.
  • Implementing automated security validation to adapt to these evolving threats.

Validating your security controls will prevent you from becoming the next breach victim.

Cymulate Exposure Validation makes advanced security testing fast and easy. When it comes to building custom attack chains, it's all right in front of you in one place.
Mike Humbert, Cybersecurity Engineer
DARLING INGREDIENTS INC.
Learn More
Book a Demo