Akira Ransomware Eyes Legacy Servers of Defunct Companies

In a concerning revelation, cybercriminals have reaffirmed their ability to target organizations in pursuit of valuable data. Traditionally, ransomware groups focus on active businesses, stealing critical data and encrypting it to demand ransom payments. However, a recent case involving the notorious Akira Ransomware gang has emerged, showcasing an unexpected twist that raises numerous questions.

The Akira gang has announced the acquisition of sensitive data from Regency Media, an Australian media organization that has not been operational since 2023. This situation is perplexing, as it is unusual for cybercriminals to target a defunct entity, particularly given the lack of potential for ransom recovery.

It is noteworthy that Regency Media’s data, which encompasses sensitive personal information—ranging from driver’s licenses and passport details to employee contact information—has now surfaced on the dark web. The data breach reportedly involved around 16GB of sensitive information, including financial documents and non-disclosure agreements.

The peculiar aspect of this incident lies in Regency Media’s status as a non-operational entity. This company, which historically engaged in the manufacture of media products, ceased its business activities entirely in July 2023, rendering its potential for ransom payment nonexistent. This raises critical questions about the motivations behind such an attack.

Initial examinations suggest that the cybercriminals may have accessed legacy data archives retained by Regency Media, despite the company no longer functioning. While these servers might still contain older proprietary data, they do not connect to current business operations, thus presenting a unique scenario. The breach’s occurrence at a time when Regency Radio had officially closed further complicates the narrative, as it implies the attackers might have retained the data before deciding to leak it.

Experts in cybersecurity indicate that it is possible the breach originated in 2023, coinciding with the company’s shutdown. It is not uncommon for data breaches to remain cloaked for a time before criminals opt to release or sell sensitive data, driven by continuous demand even from defunct businesses.

This incident underscores a vital point about the motivations of cybercriminals: financial gain remains the primary driver, and the operational status of the target appears irrelevant. For these attackers, whether a company is active or inactive, the focus centers on exploiting whatever sensitive data they can obtain.

The Akira Ransomware incident serves as a potent reminder of the persistent and adaptive nature of cyber threats. Companies that no longer exist are not exempt from the risk of data breaches, and criminals will relentlessly pursue means to exploit sensitive information under any circumstances.

Join over 500,000 cybersecurity professionals in our LinkedIn group “Information Security Community”!

Source