ctipilot.ch

Home · Briefs · CTI Weekly Summary — 2026-W19 (May 04 – May 10, 2026)

Akira ransomware — Swiss healthcare case confirmed; broader European playbook unchanged

From CTI Weekly Summary — 2026-W19 (May 04 – May 10, 2026) · published 2026-05-11

Current state: Akira's leak-site listing on Groupe 3R (§ 1) is the operationally specific Swiss-healthcare development this week. The broader Akira playbook (edge-device initial access via Cisco ASA/FTD, Fortinet SSL-VPN, VMware ESXi authenticated RCE; intermittent file-encryption to evade EDR file-IO heuristics) has been documented across European healthcare and SME targeting throughout 2025 and into 2026. No major Akira TTP shift detected in this week's reporting; the operator continues to favour edge-device initial access and double-extortion (encrypt + leak). Outstanding defender question: whether the Groupe 3R "will not pay" public stance changes the operator's posture for repeat victims (3R's prior April 2025 incident is acknowledged in its own statement as having involved different attackers and methodology).