Site icon The SOC Labs

Nissan Cyber Attack Claimed by Akira Ransomware Group, Alledgedly Stolen 100 GB Data

Nissan Cyber Attack By Akira Ransomware

Akira ransomware group claimed responsibility for a cyber attack on Nissan Australia and New Zealand. In the Nissan cyber attack, the ransomware group claimed to have stolen 100 GB data and demanded a ransom.

In December 2023, Nissan Motor Corporation and Nissan Financial Services in Australia and New Zealand announced that their internal systems were hacked. They said that an ‘unauthorised third party’ had ‘illegally accessed some of its network systems’ in Australia and New Zealand and was ‘working to understand the full extent’ of the breach.

Figure: Akira Ransomware Note on Nissan Cyber Attack | Figure Source: SecurityWeek.com

Cyber security agencies in Australia and New Zealand have been alerted to this, as have privacy regulators and police. Nissan won’t pay the ransom, which the attackers say they’ll splash on the internet in the next few days.

Other carmakers were hit hard by cyberattacks in recent months, including Nissan. After a ransomware attack, Toyota Germany recently informed customers that personal information had been stolen in a data breach.

What is Akira Ransomware?

Akira Ransomware is a malicious software program that targets computer systems and encrypts files, rendering them inaccessible. Once encrypted, victims are prompted to pay a ransom in exchange for the decryption key, which can restore access to the encrypted files. Usually, the extension for the encrypted files is [.]akira. Akira is gaining popularity due to its double extortion tactics, a ransomware-as-a-service (RAAS) distribution model, and unique payment methods. United States is the top targetted country by Akira ransomware group, followed by Canada and the United Kingdom. Akira ransomware group, one of the trending gangs, has taken credit for the Nissan attack, claiming to have seized 100 GB of information, including corporate files and employees’ personal information.

Figure: The 10 countries most targeted by the Akira ransomware group | Figure Source – TrendMicro
Figure: Number of published victims on Akira’s blog, the cutoff date for November is the 20th | Source: Trellix
How Akira Ransomware Attack Takes Place?
Figure: The typical Akira ransomware infection chain | Figure Source: TrendMicro

Akira ransomware usually extracts credentials from its affiliates or other attacks to gain access to victim environments. This malicious code is being executed with the help of tools such as PCHunter, AdFind, PowerTool, Terminator, Advanced IP Scanner, Windows Remote Desktop Protocol (RDP), AnyDesk, Radmin, WinRAR, and Cloudflare’s tunneling tool.

Figure: The Akira Ransomware Leak Site | Source: Trellix
MITRE ATT&CK Techniques

According to the researchers at Trellix, below are the relevant MITRE ATT&CK Techniques for the Akira ransomware.

T1003.001: OS Credential Dumping: LSASS Memory
T1048: Exfiltration Over Alternative Protocol
T1021.001: Remote Services: Remote Desktop Protocol
T1059.001: Command and Scripting Interpreter: PowerShell
T1106: Native API
T1190: Exploit Public-Facing Application
T1486: Data Encrypted for Impact
T1490: Inhibit System Recovery
T1566: Phishing
T1584: Compromise Infrastructure

In March, the Akira ransomware operation emerged, which was linked to the notorious Conti group. So far, Akira has targeted approximately 180 organizations, most of them in the United States.

Cyber attacks are on the rise, and not just the auto manufacturing industry but also the healthcare industry is under tremendous pressure from increasing cyber-attacks.

For more cybersecurity news and updates, follow us on Cybersecurity – The SOC Labs.


Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The SOC Labs assumes no liability for the accuracy or consequences of using this information.

Exit mobile version