{"id":5058,"date":"2026-04-03T08:45:03","date_gmt":"2026-04-03T08:45:03","guid":{"rendered":"https:\/\/ft365.org\/index.php\/2026\/04\/03\/researchers-observe-sub-one-hour-ransomware-attacks\/"},"modified":"2026-04-03T08:45:03","modified_gmt":"2026-04-03T08:45:03","slug":"researchers-observe-sub-one-hour-ransomware-attacks","status":"publish","type":"post","link":"http:\/\/ft365.org\/index.php\/2026\/04\/03\/researchers-observe-sub-one-hour-ransomware-attacks\/","title":{"rendered":"Researchers Observe Sub-One-Hour Ransomware Attacks"},"content":{"rendered":"<div>\n<p><img decoding=\"async\" src=\"https:\/\/ft365.org\/wp-content\/uploads\/2025\/06\/localimages\/ea721ff9-8ba4-4d88-b386-57e9e1606077.jpg?width=64&#038;height=64&#038;mode=crop&#038;scale=both&#038;format=webp\" alt=\"Photo of Phil Muncaster\" loading=\"lazy\"><\/p>\n<\/div>\n<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>Security researchers have warned of another step change in the velocity of ransomware, after spotting the Akira group complete all stages of an attack within an hour.<\/p>\n<p>Halcyon said in a new report that Akira usually achieves initial access by exploiting vulnerabilities in internet-facing VPN appliances and backup solutions, especially those lacking multi-factor authentication (MFA).<\/p>\n<p>In the past, these have included devices from SonicWall, Veeam and Cisco, although the group has also been observed using credential theft, spearphishing, password spraying, and even initial access brokers (IABs).<\/p>\n<p>It is one of the more sophisticated groups out there, with suspected former Conti hackers now engaged in operations.<\/p>\n<p><em>Read more on ransomware velocity: Ransomware Gangs Increasingly Prioritize Speed and Volume in Attacks.<\/em><\/p>\n<p>Following initial access, Akira usually exfiltrates data prior to encryption \u2013 following a classic double-extortion model. Threat actors try to evade detection by disabling security software, and then use living-off-the-land approaches (eg FileZilla, WinRAR, WinSCP and RClone) for data staging and encryption, the report explained.<\/p>\n<h2>A Focus on Speed<\/h2>\n<p>Halcyon said Akira manages to complete an entire attack lifecycle in under four hours, and in some cases less than one hour without detection.<\/p>\n<p>This is because it is \u201cmore stealthy and less aggressive\u201d than other groups such as Play, the report claimed. Zero-day exploits and compromised credentials enable covert access while intermittent encryption speeds up the process of scrambling victims\u2019 files.<\/p>\n<p>\u201cAkira is known to set encryption to as low as 1% of a file and push to all devices to maximize impact in a short duration,\u201d Halcyon said.<\/p>\n<p>\u201cAkira&#8217;s combination of rapid compromise capabilities, disciplined operational tempo, and investment in reliable decryption infrastructure sets it apart from many ransomware operators.\u201d<\/p>\n<p>This has enabled the group to generate as much as $244m since it appeared in March 2023, according to the US government.<\/p>\n<h2>How to Protect the Organization<\/h2>\n<p>Halcyon urged organizations to adopt layered defenses to mitigate the threat from Akira and other ransomware groups. This includes:\u00a0<\/p>\n<ul>\n<li>Hardening against initial access, including \u201ctrusted relationships\u201d and \u201cthird-party access pathways\u201d<\/li>\n<li>Limiting lateral movement and credential abuse by restricting remote services and misuse of accounts<\/li>\n<li>Detecting data staging and exfiltration by monitoring for archive-collected data and command-and-control channels<\/li>\n<li>Protecting against encryption impact through tested recovery processes<\/li>\n<li>Deploying a dedicated anti-ransomware solution that blocks malicious binaries pre-execution, detects runtime behaviors and exfiltration efforts, prevents tampering and network intrusion, and protects backup integrity<\/li>\n<\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers have warned of another step change in the velocity of ransomware, after spotting the Akira group complete all stages of an attack within an hour. Halcyon said in a new report that Akira usually achieves initial access by exploiting vulnerabilities in internet-facing VPN appliances and backup solutions, especially those lacking multi-factor authentication (MFA).<\/p>\n","protected":false},"author":2,"featured_media":5059,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5058","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5058-6dc82692-35b0-4fb5-b87e-42802b0eeb22.jpg",300,300,false],"thumbnail":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5058-6dc82692-35b0-4fb5-b87e-42802b0eeb22-150x150.jpg",150,150,true],"medium":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5058-6dc82692-35b0-4fb5-b87e-42802b0eeb22.jpg",300,300,false],"medium_large":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5058-6dc82692-35b0-4fb5-b87e-42802b0eeb22.jpg",300,300,false],"large":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5058-6dc82692-35b0-4fb5-b87e-42802b0eeb22.jpg",300,300,false],"1536x1536":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5058-6dc82692-35b0-4fb5-b87e-42802b0eeb22.jpg",300,300,false],"2048x2048":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5058-6dc82692-35b0-4fb5-b87e-42802b0eeb22.jpg",300,300,false],"morenews-featured":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5058-6dc82692-35b0-4fb5-b87e-42802b0eeb22.jpg",300,300,false],"morenews-large":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5058-6dc82692-35b0-4fb5-b87e-42802b0eeb22.jpg",300,300,false],"morenews-medium":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5058-6dc82692-35b0-4fb5-b87e-42802b0eeb22.jpg",300,300,false],"crawlomatic_preview_image":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5058-6dc82692-35b0-4fb5-b87e-42802b0eeb22-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"http:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"http:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/5058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=5058"}],"version-history":[{"count":0,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/5058\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/5059"}],"wp:attachment":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=5058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=5058"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=5058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}