2026 Futuriom 50: Highlights →Explore

Executive Summary

In early 2024, the Akira ransomware-as-a-service (RaaS) operation expanded its attack capabilities by targeting Nutanix virtual machines, allowing it to compromise both Windows and Linux workloads within critical infrastructure and enterprise environments. Attackers exploited new vulnerabilities and lateral movement techniques to rapidly deploy ransomware, encrypting data at scale and causing significant business disruption among targeted organizations. Notably, Akira’s evolving tooling enabled them to bypass certain traditional detection measures and exfiltrate sensitive information to pressure victims into ransom payment.

This campaign highlights the increasing sophistication of ransomware operators and the growing risk posed to hybrid and multicloud environments. The success of the Akira group against high-value sectors underscores the urgent need for advanced east-west traffic security, visibility, and robust segmentation strategies.

Why This Matters Now

Ransomware groups like Akira are quickly adapting to target virtualized and multi-cloud enterprise environments, posing heightened risks to business continuity and regulatory compliance. As more organizations rely on Nutanix and similar platforms, evolving threat actor tactics demand immediate attention to visibility, segmentation, and detection gaps in east-west traffic.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

Akira leveraged new tools and vulnerabilities to access both Windows and Linux workloads on Nutanix virtual machines, executing lateral movement and ransomware deployment undetected.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Network segmentation, inline policy enforcement, east-west traffic controls, and proactive anomaly detection could have significantly contained or prevented movement across Nutanix VMs and mitigated both ransomware propagation and sensitive data egress.

Initial Compromise

Control: Multicloud Visibility & Control

Mitigation: Unauthorized access attempts would be detected and flagged for response.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Privilege escalation paths would be limited to only approved communications.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Lateral propagation across VMs would be prevented by strict east-west policy enforcement.

Command & Control

Control: Threat Detection & Anomaly Response

Mitigation: Covert C2 channels and abnormal management activity would trigger alerts.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Unapproved data transfers to external destinations would be blocked or logged for response.

Impact (Mitigations)

Propagation and execution of ransomware payloads would be contained within isolated segments.

Impact at a Glance

Affected Business Functions

  • Data Storage
  • Virtualization Services
  • Backup and Recovery
Operational Disruption

Estimated downtime: 5 days

Financial Impact

Estimated loss: $500,000

Data Exposure

Potential exposure of sensitive virtual machine data and backup files due to unauthorized access and encryption by ransomware.

Recommended Actions

  • Implement identity-based segmentation and least privilege policies to restrict lateral movement and privilege escalation paths.
  • Enforce east-west traffic controls with microsegmentation to isolate sensitive VMs and workloads.
  • Establish comprehensive, real-time visibility and centralized monitoring across all cloud and hybrid environments.
  • Apply strict egress control and outbound policy enforcement to detect and block unapproved data exfiltration.
  • Deploy anomaly detection and automated response to rapidly identify and contain ransomware or C2 activity across cloud assets.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image