Changeflow GovPing Trade & Sanctions AKIRA Ransomware Targets 200 Swiss Companies, A...
Priority review Notice Added Final

AKIRA Ransomware Targets 200 Swiss Companies, Authorities Investigate

Favicon for www.newsd.admin.ch Switzerland fedpol News
Published
Detected
Email

Summary

The AKIRA ransomware group has targeted approximately 200 Swiss companies since May 2023, causing damages exceeding several million Swiss francs, with the Office of the Attorney General (OAG) initiating criminal proceedings in April 2024 under Articles 143, 144bis, and 156 of the Swiss Criminal Code (data theft, data damage, and extortion). The investigation is coordinated by fedpol in cooperation with the NCSC and authorities in other affected countries, and authorities note an escalation to four to five new cases per week. The OAG, fedpol, and NCSC urge victims not to pay ransoms and to file criminal complaints to strengthen investigative lines of enquiry against the group.

“The OAG, fedpol and the NCSC stress that filing a complaint helps to increase the potential lines of enquiry, thereby increasing the chances of success in combating these criminal groups.”

OAG , verbatim from source
Why this matters

Swiss companies and organizations with internet-accessible systems, particularly those using unsecured VPN or RDP remote access, should verify that two-factor authentication (2FA) is enforced on all remote access mechanisms and that systems are fully patched. The documented escalation to four to five new AKIRA cases per week in Switzerland represents a sharp increase in active targeting. Any Swiss organization receiving a ransom demand should contact the NCSC before taking action — paying the ransom is strongly discouraged by authorities and may fund further criminal activity, while filing a complaint directly supports ongoing enforcement efforts.

AI-drafted from the source document, validated against GovPing's analyst note standards . For the primary regulatory language, read the source document .
Published by OAG on admin.ch . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

GovPing monitors Switzerland fedpol News for new trade & sanctions regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 2 changes logged to date.

What changed

The joint press release from the OAG, fedpol, and NCSC announces the intensification of AKIRA ransomware attacks targeting Swiss companies, with approximately 200 victims and damages exceeding several million Swiss francs. Criminal proceedings initiated in April 2024 are underway under Articles 143 (data theft), 144bis (damaging data), and 156 (extortion) of the Swiss Criminal Code.

Swiss companies should be aware that the authorities strongly advise against paying ransoms, as this funds criminal activity, and recommend contacting authorities and filing criminal complaints in every case. The press release provides specific technical guidance: deactivate internet connections immediately if attacked, verify and secure backups, and physically disconnect systems from infected networks. The authorities believe a significant number of cases remain unreported due to victims paying ransoms and avoiding public disclosure.

Companies in Switzerland that may be targeted by ransomware should review their security measures, ensure VPN and RDP access is protected by two-factor authentication (2FA), and maintain updated systems to prevent infection.

What to do next

  1. Do not pay the ransom — contact the authorities
  2. File a criminal complaint in every case
  3. Consult the authorities before taking any action in response to a ransom demand

Archived snapshot

Apr 27, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Press release Published on 16 October 2025

Cybercrime: the AKIRA group steps up its activities

Berne, 16.10.2025 — Joint press release from the OAG, fedpol, and the NCSC - In recent months, the hacker group AKIRA has stepped up its activities in Switzerland. Around two hundred companies have been victims of ransomware attacks, with damages currently amounting to several millions of Swiss francs, and to several hundreds of millions of dollars worldwide. Since April 2024, the Office of the Attorney General of Switzerland (OAG) has been conducting criminal proceedings. The investigation is being coordinated by the Federal Office of Police (fedpol), in close cooperation with the National Cyber Security Centre (NCSC) and the authorities in several other countries that are affected. The Swiss authorities stress the importance of contacting them before taking any action and of the need to file a criminal complaint.


Since April 2024, the OAG has been conducting criminal proceedings against persons unknown in response to several ransomware attacks on Swiss companies, which began in May 2023 and have continued to September 2025. The hacker group known as AKIRA has claimed responsibility for the attacks, which are still ongoing and have intensified in recent months. The authorities have observed an increase in the number of cases involving the same ransomware (four to five per week, a record for Switzerland), which proves that the group in question is highly active. Around two hundred companies in Switzerland have already fallen victim, with the damages currently exceeding several million Swiss francs, and amounting to several hundreds of million dollars worldwide.

The OAG has taken charge of several cantonal investigations opened into identical attacks. Its proceedings are currently being conducted against persons unknown in connection with data theft (Art. 143 Swiss Criminal Code (SCC)), damaging data (Art. 144bis SCC) and extortion (Art. 156 SCC), or alternatively attempted extortion (Arts 22 and 156 SCC). The investigation is being coordinated by the Federal Office of Police (fedpol), working closely with the National Cyber Security Centre (NCSC) and the authorities in several of the other countries affected.

The AKIRA group first appeared on the scene in March 2023, quickly becoming the subject of several articles in the specialised press. It uses software specifically developed for purpose, with its IT infrastructure spread across several countries around the world. It carries out what is commonly known as ‘double extortion’, which involves exfiltrating and then encrypting the victim’s data. Once the data have been encrypted, the victim company can only observe as its IT network is totally or partially disabled, making its activities potentially impossible. If the ransom is not paid within the set deadline, AKIRA not only refuses to provide the decryption key that allows the victim to access its data again, but also publishes the data in a blog hosted on the Darknet. This blog is known as a DLS or ‘data leak site’. The ransom is paid in cryptocurrency, in most cases Bitcoin.

Do not pay the ransom – contact the authorities

Based on the information gathered so far in the course of the investigation, the authorities assume that a certain number of cases have not been reported. This is because the victims, fearing damage to their reputation, pay the ransoms demanded and/or decide against filing a criminal complaint. The OAG, fedpol and the NCSC stress that filing a complaint helps to increase the potential lines of enquiry, thereby increasing the chances of success in combating these criminal groups. The authorities advise not to pay the ransom, as this helps to fund the perpetrators’ activities. They therefore recommend that the companies concerned consult the authorities before taking any action in response to a ransom demand.

Specific measures

Although these ransomware attacks are normally complex, most of them can be prevented. Most often, the gateway for these ransomware attacks are outdated systems and means of remote access such as VPN (Virtual Private Network) and RDP (Remote Desktop Protocol) that are not secured by two-factor authentication (2FA). In the event of an attack, all internet connections (web, email, remote access and site-to-site VPN) must first be deactivated. Backups must be verified and secured immediately. The systems must also be physically disconnected from the infected network as soon as possible. The main aim in resolving the attack is to identify the method of infection and prevent a further infection. The authorities recommend that victims file a criminal complaint in every case.

For further information, see: Ransomware – what next?

Original text of the press release in French.

Get daily alerts for Switzerland fedpol News

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from OAG.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
OAG
Published
October 16th, 2025
Instrument
Notice
Branch
Executive
Joint with
fedpol NCSC
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Companies Technology companies Healthcare providers
Industry sector
5112 Software & Technology
Activity scope
Ransomware attack response Criminal investigation
Geographic scope
Switzerland CH

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Data Privacy Criminal Justice

Get alerts for this source

We'll email you when Switzerland fedpol News publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!