Akira is a ransomware group that emerged in April 2023, operating with primarily financial motivations and has rapidly established itself as a significant threat actor with over 1,500 documented victims. The group's country of origin remains unclear, though they operate as a Ransomware-as-a-Service (RaaS) model, recruiting affiliates to conduct attacks while the core group maintains the ransomware infrastructure and negotiation processes. Akira employs multi-faceted attack methodologies including exploitation of VPN vulnerabilities, particularly targeting Cisco VPN appliances, and utilizes living-off-the-land techniques along with legitimate administrative tools to avoid detection, while implementing double extortion tactics by exfiltrating sensitive data before deploying their encryption payload. The group has demonstrated a preference for targeting organizations in the United States, Canada, Germany, United Kingdom, and Italy, with a particular focus on manufacturing, business services, technology, and construction sectors, though they have shown willingness to attack various industries. Despite being relatively new to the ransomware landscape, Akira has maintained consistent operations throughout 2023 and into 2024, with law enforcement agencies including CISA and FBI issuing advisories about their activities, though no major disruption operations have been publicly reported against the group as of late 2024. The group has been linked to 1,620 public disclosures across our corpus. First observed on a leak site on April 26, 2023; most recent post May 22, 2026. The operation is currently active.
Also tracked as: Megazord.
Sector and geography
This disclosure adds to ransomware activity in the Technology sector, which has 2,524 disclosures indexed across all operators we track. Geographically, ad.snadc.com is reported in AD.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.