Akira Ransomware

In recent news, CERT-In has issued a warning to internet users against Akira attacks.
What is Akira Ransomware?
- Akira is a computer malware, specifically a ransomware virus.
- Ransomware is a type of malware that infects victim systems and blocks the victims from using their own data.
- The victim can regain access only upon paying the ransom.
How does Akira Operate?
- Akira targets Windows and Linux-based systems.
- It accesses victims via VPN services, especially when multi-factor authentication isn’t enabled.
- It uses tools like AnyDesk, WinRAR, and PCHunter, which are often found in the victim’s environment.
Infiltration and Encryption
- Upon infiltrating a device, Akira deletes the Windows Shadow Volume Copies, which are backup copies of files used for emergency data restoration.
- After deleting the Shadow Volume Copies, it becomes harder for the user to recover their files without paying the ransom.
- It then proceeds to encrypt the user’s files by converting data into a code that can only be decrypted with a specific key, which is held by the attackers.
- During the encryption process, Akira adds a ‘.akira’ extension to the names of all encrypted files.
- To ensure a smooth encryption without interruptions, the ransomware stops certain active Windows services using the Windows Restart Manager API. copyright©iasexpress.net
Targets and Extortion
- Akira targets various folders on the hard drive to encrypt files but avoids specific folders such as ProgramData, Recycle Bin, Boot, System Volume Information, and Windows folders.
- After stealing personal information and encrypting the data, it conducts double extortion to get the victims to pay the ransom.
- If the victim refuses to pay the ransom, the stolen data is released on the dark web.
Protective Measures Against Akira
- Maintain basic online hygiene and protection protocols.
- Maintain offline backups of important data and ensure that these backups are up to date.
- Regularly update operating systems and applications.
- Consider ‘virtual patching’ to safeguard legacy systems and networks.
- Use strong password policies and multi-factor authentication.
- Avoid using updates/patches available in any unofficial channel.
With Akira ransomware posing a considerable threat to both Windows and Linux-based systems, adopting preventative measures recommended by CERT-In can significantly mitigate the risk of attacks. As always, maintaining online hygiene and staying updated on system patches is essential in combating such cybersecurity threats.
Responses