The Akira ransomware gang has attacked GC&E. GC&E is a system integrator that specializes in delivering IT, electronic security, and communications related solutions. It was founded in 1999 and is headquartered in Georgia, USA.Akira posted GC&E to its data leak site on June 23rd but did not provide any further details. The Akira ransomware gang, first identified in May 2023, utilizes the Windows Restart Manager API to effectively close processes or terminate Windows services that might be actively using a file, thereby allowing the encryption process to proceed unhindered. A ransom note named "akira_readme.txt" is placed in each computer folder affected by the ransomware. This note serves as a communication from the attackers, explaining the situation and providing links to the Akira data leak site and negotiation site. The ransom note issued by the Akira group contains a chilling warning: "Regarding your data, in the event that we fail to reach an agreement, we will attempt to sell your personal information, trade secrets, databases, source codes, and anything else deemed valuable on the dark market to multiple threat actors simultaneously. Subsequently, all of this compromised information will be publicly exposed on our blog." Like other ransomware groups, the Akira gang infiltrates corporate networks and expands its reach to connected devices. After acquiring Windows domain admin credentials, the threat actors deploy ransomware across the entire network. Before encrypting the files, the attackers take the additional step of exfiltrating sensitive corporate data. This stolen information is used as leverage during their extortion tactics, as they warn victims that the data will be made public unless a ransom payment is made. The Akira gang has invested considerable effort into designing their data leak website, which features a retro aesthetic and allows visitors to navigate it using command inputs.
This attack's description was not found, while we work on the detailed account of this attack we invite you to browse through other recent Rasomware Attacks in the table below.