🛡 H3lium@infosec.exchange/:~# :blinking_cursor:<p>"🚨 Akira Ransomware Strikes! Bucks County's Emergency Services Crippled 🚨"</p><p>Bucks County's emergency dispatch system faced a severe cyberattack, which is now traced back to the notorious Akira ransomware gang. This attack resulted in significant operational disruptions, forcing emergency services to revert to manual methods. As a sophisticated group known for targeting governments and businesses globally, Akira's modus operandi includes charging exorbitant ransoms for releasing hijacked data. The county, in collaboration with federal agencies, continues to investigate, maintaining operational 9-1-1 services despite the challenges.</p><p>Source: <a href="https://www.nbcphiladelphia.com/news/local/akira-ransomware-behind-bucks-co-security-attack-that-crippled-emergency-dispatch-system-officials-say/3759350/" rel="nofollow noopener noreferrer" target="_blank">Hayden Mitman via nbcphiladelphia.com</a></p><p>Tags: <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/EmergencyServices" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EmergencyServices</span></a> <a href="https://infosec.exchange/tags/AkiraRansomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AkiraRansomware</span></a> <a href="https://infosec.exchange/tags/BucksCounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BucksCounty</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> 🚒🔒💻</p><p>Additional insights from Sophos News highlight the Akira ransomware gang's techniques, including exploiting Remote Desktop Protocol (RDP) for lateral movement and utilizing tools like Advanced IP Scanner for network reconnaissance. They're known for persistence tactics, such as creating user accounts and modifying registry keys for sustained access. Defense evasion strategies include uninstalling security tools and manipulating Windows Defender settings. For command-and-control, AnyDesk and bespoke Trojans are employed for remote network access.</p><p>This deep dive into Akira's tactics emphasizes the need for robust cybersecurity measures in critical infrastructure sectors.</p><p>Source: <a href="https://news.sophos.com/en-us/2023/12/21/akira-again-the-ransomware-that-keeps-on-taking/" rel="nofollow noopener noreferrer" target="_blank">Sophos News</a></p><p>Tags: <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/RansomwareTactics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RansomwareTactics</span></a> <a href="https://infosec.exchange/tags/Sophos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sophos</span></a> <a href="https://infosec.exchange/tags/InfoSecCommunity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSecCommunity</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> 🛡️💡💻</p>