Akira attacks Morehead State University

Incident Date: Jul 27, 2023

Attack Overview
VICTIM
Morehead State University
INDUSTRY
Education
LOCATION
USA
ATTACKER
Akira
FIRST REPORTED
July 27, 2023

The Akira Ransomware Gang's Attack on Morehead State University

The Akira ransomware gang has attacked Morehead State University. Morehead State University (MSU) is a public university located in Morehead, Kentucky, United States. Established in 1887, the university offers a variety of educational programs at the undergraduate and graduate levels. MSU is part of the Kentucky state university system and serves as an educational and cultural hub for the region.

Akira posted Morehead State University to its data leak site on July 27th, claiming to have stolen employee and staff personal data, as well as finance and marketing data.

Akira Ransomware Gang's Modus Operandi

The Akira ransomware gang, first identified in May 2023, utilizes the Windows Restart Manager API to effectively close processes or terminate Windows services that might be actively using a file, thereby allowing the encryption process to proceed unhindered. In each computer folder affected by the ransomware, a ransom note named "akira_readme.txt" is placed. This note serves as a communication from the attackers, explaining the situation and providing links to the Akira data leak and negotiation sites.

The ransom note issued by the Akira group contains a chilling warning: "Regarding your data, in the event that we fail to reach an agreement, we will attempt to sell your personal information, trade secrets, databases, source codes, and anything else deemed valuable on the dark market to multiple threat actors simultaneously. Subsequently, all of this compromised information will be publicly exposed on our blog."

Impact and Tactics of the Akira Gang

Like other ransomware groups, the Akira gang infiltrates corporate networks and expands its reach to other connected devices. After acquiring Windows domain admin credentials, the threat actors deploy ransomware across the entire network. Before encrypting the files, the attackers take the additional step of exfiltrating sensitive corporate data. This stolen information is then used as leverage during their extortion tactics, as they warn victims that the data will be made public unless a ransom payment is made.

The Akira gang has invested considerable effort into designing their data leak website, which features a retro aesthetic and allows visitors to navigate it using command inputs.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.