Akira Ransomware Gang Hits LG Energy Solution, Claims 1.7TB Data Theft

LG Energy Solution Confirms Ransomware Attack as Akira Gang Claims Exfiltration of 1.7 Terabytes of Data

HIGH
November 24, 2025
5m read
RansomwareData BreachCyberattack

Impact Scope

Affected Companies

LG Energy Solution

Industries Affected

ManufacturingEnergy

Related Entities

Threat Actors

Other

Akira RansomwareLG Energy Solution

Full Report

Executive Summary

LG Energy Solution, a major South Korean battery manufacturer, has confirmed it suffered a ransomware attack at an overseas facility. The Akira ransomware group has claimed responsibility, asserting they exfiltrated 1.7 terabytes of data before deploying their encryptor. The company has stated that the affected systems are restored and the breach was contained to the single facility. This incident is another example of a high-profile, double-extortion attack targeting the manufacturing industry, a sector frequently victimized by groups like Akira who often exploit weak credentials on remote access services.


Threat Overview

The attack follows the standard double-extortion ransomware model. The Akira gang, a prolific threat actor, gained access to the network of an LG Energy Solution overseas plant. Before encrypting files to disrupt operations, the attackers exfiltrated a large volume of data (claimed to be 1.7 TB). This stolen data is then used as leverage; if the ransom is not paid, the group threatens to leak the data publicly on their dark web site. The article notes that a common initial access vector for ransomware groups like Akira is the use of compromised credentials for Virtual Private Networks (VPNs), which accounted for nearly half of all ransomware initial access in Q3 2025.


Technical Analysis

While the specific vector for the LG breach is not confirmed, the attack pattern is consistent with Akira's known TTPs.

Likely Attack Chain:

  1. Initial Access: The attackers likely gained access via T1133 - External Remote Services, exploiting a VPN without multi-factor authentication using previously compromised credentials.
  2. Discovery & Lateral Movement: Once inside, the attackers would have performed network reconnaissance to identify high-value data stores and domain controllers.
  3. Data Exfiltration: Before encryption, the attackers would stage and exfiltrate large amounts of data using techniques like T1048 - Exfiltration Over Alternative Protocol.
  4. Impact: Finally, the Akira ransomware payload is deployed across the network to encrypt files, mapping to T1486 - Data Encrypted for Impact.

The Akira ransomware itself is known to be a sophisticated C++ based malware that avoids certain file types and directories to prevent rendering the system completely unusable.


Impact Assessment

The operational impact was limited to a single overseas facility, which has since been restored. However, the primary risk now lies with the 1.7 TB of allegedly stolen data. If the data includes sensitive intellectual property, such as battery designs, manufacturing processes, or R&D data, its public release could cause significant competitive and financial damage to LG Energy Solution. The leak of employee or customer data could also trigger regulatory fines and lawsuits. This incident reinforces the severe business risks posed by ransomware, extending far beyond simple operational downtime.


Cyber Observables for Detection

Type Value Description Context Confidence
log_source VPN Logs Look for multiple failed login attempts followed by a success, or logins from unusual geolocations or non-corporate IP addresses. SIEM / Remote Access Logs high
network_traffic_pattern * Unusually large data transfers from internal servers to external IP addresses, especially those not associated with known business partners or cloud services. NetFlow / DLP / Firewall Logs high
process_name vssadmin.exe Ransomware often uses vssadmin.exe delete shadows /all /quiet to delete volume shadow copies and prevent easy recovery. EDR / Windows Event Logs high

Detection & Response

Detection:

  1. Behavioral Monitoring: Deploy an EDR solution capable of detecting common ransomware behaviors, such as rapid file encryption, deletion of shadow copies, and disabling security tools. This aligns with D3-FCR - File Content Rules and D3-PA - Process Analysis.
  2. VPN Log Analysis: Actively monitor VPN logs for signs of credential stuffing or brute-force attacks. Implement UEBA to detect anomalous login patterns.
  3. Data Exfiltration Detection: Use network traffic analysis and DLP tools to monitor for large outbound data flows to unusual destinations.

Response:

  1. Isolate: Immediately isolate compromised endpoints and network segments to prevent further spread of the ransomware.
  2. Secure Backups: Verify that backups are offline, isolated, and have not been compromised. Initiate restoration to clean hardware.
  3. Preserve Evidence: Take forensic images of affected systems for investigation before wiping and restoring them.

Mitigation

Strategic:

  1. Zero Trust Segmentation: Implement network segmentation to limit lateral movement. If an attacker compromises one part of the network, they should not be able to easily access others.
  2. Backup and Recovery: Maintain multiple, isolated copies of critical data, including at least one offline and one off-site copy (3-2-1 rule).

Tactical:

  1. Secure VPNs: Enforce MFA on all remote access solutions, especially VPNs. This is the single most effective control against credential-based intrusions. This maps to D3-MFA - Multi-factor Authentication.
  2. Patch Management: Keep all systems, especially internet-facing ones like VPN concentrators, fully patched.
  3. Principle of Least Privilege: Ensure user accounts have only the minimum permissions necessary to perform their roles.

Timeline of Events

1
November 24, 2025
This article was published

MITRE ATT&CK Mitigations

Enforce MFA on all remote access services, especially VPNs, to prevent attackers from using stolen credentials for initial access.

Ensure robust backup and recovery strategies are in place, with backups stored offline and isolated from the primary network.

Segment the network to contain the spread of ransomware and prevent attackers from moving laterally from compromised systems to critical assets.

Deploy and maintain an EDR solution with behavioral detection capabilities to identify and block ransomware activity.

D3FEND Defensive Countermeasures

The most critical defense against ransomware campaigns like Akira, which heavily rely on compromised credentials, is the implementation of Multi-factor Authentication (MFA). Given that nearly half of ransomware breaches originate from hijacked VPN credentials, mandating MFA on all remote access points (VPNs, RDP gateways, Citrix) is paramount. This should be applied not only to employees but also to contractor and third-party accounts. By requiring a second factor of authentication (e.g., a mobile app push, hardware token, or biometric), organizations can effectively neutralize the threat of stolen passwords, forcing attackers to find a much more difficult and complex entry vector. This single control dramatically raises the cost and effort for attackers and is a foundational element of modern cybersecurity defense.

To combat the final 'Impact' stage of the Akira ransomware attack, organizations should deploy File Content Rules, often known as 'honeypot' files or file canaries. This involves strategically placing decoy files on file servers and critical endpoints. These files should be named to be attractive to an attacker (e.g., 'passwords.xlsx', 'financial_projections.docx') but should never be accessed by legitimate users or processes. File Integrity Monitoring (FIM) or EDR systems should be configured to generate a high-priority alert the instant these decoy files are read, modified, or encrypted. This provides a high-fidelity, last-line-of-defense alert that active ransomware encryption is occurring on the network, allowing security teams to trigger an automated response, such as isolating the affected host, before widespread damage can occur.

Sources & References

24th November – Threat Intelligence Report
Check Point Research (research.checkpoint.com) November 24, 2025
Half of Ransomware Access Due to Hijacked VPN Credentials
Infosecurity Magazine (infosecurity-magazine.com) November 19, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RansomwareAkiraLG Energy SolutionData BreachManufacturingDouble ExtortionVPN

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading