Dark Web Profile: Akira Ransomware
[Update] October 1, 2024: “What Are the Latest Akira News?”
Since its discovery in early 2023, Akira ransomware has evolved from a seemingly ordinary addition to the ransomware landscape to a significant threat affecting a wide range of businesses and critical infrastructure entities. This evolution, coupled with its unique aesthetic on its leak site and communications, has drawn attention to its operations.
As recently published CISA advisory claims, with over 250 organizations impacted and approximately $42 million (USD) in ransomware proceeds claimed as of January 1, 2024.
Who is Akira Ransomware
The ransom group employs a double extortion strategy, first exfiltrating data and then encrypting devices within the targeted network. Payment is then demanded not only for decrypting files but also for preventing the exposure of leaked data.
The ransomware’s name is believed to have its roots in a 1988 anime movie with a cyberpunk theme. In this film, Akira’s destruction of Neo-Tokyo is portrayed as a preventive measure against a malevolent force taking hold within the city.
This narrative parallels a common argument among ransomware operators who “claim” to perceive the world’s economic system as the source of evil. They often view themselves as modern-day Robin Hoods or Akiras, fighting against what they see as systemic injustices.
As suggested by CISA, Akira ransomware has impacted numerous businesses and critical infrastructure entities across North America, Europe, and Australia since March 2023. Initially focusing on Windows systems, the threat expanded in April 2023 to target VMware ESXi virtual machines with a Linux variant. As of January 1, 2024, the group has affected over 250 organizations and amassed approximately $42 million (USD) in ransomware proceeds.
Early versions of Akira ransomware, coded in C++, used a .akira extension for encrypted files. Starting in August 2023, some Akira attacks introduced Megazord, a Rust-based encryption tool using a .powerranges extension. The threat actors behind Akira have alternated between Megazord and Akira_v2 (identified by independent investigations) in their attacks.
Victimology
The Akira ransomware group frequently demands hefty ransoms, primarily targeting large enterprises across North America, Europe, and Australia. Typically, the malware spreads through targeted threat campaigns using phishing emails or exploiting software vulnerabilities, focusing on industries such as education, finance, manufacturing, and healthcare.
The significant number of victims in the United States dominates the chart, extremely overshadowing other countries.
This targeted country list shows that the countries closely aligned with the United States, such as the European countries, account for most victims outside the US.
In order to display the victims on the ransomware group’s homepage, which resembles a command line interface, guests must input the “-leaks” command. This command lists the victims in chronological order, starting from the first victim to the most recent.
The victims’ details are accompanied by a torrent magnet link to access the alleged files, along with information regarding the victim, the amount of leaked data, and the portion of data that has been made public.
Again, the contact part is done from this interface. When the -contacts command is entered on the command line, the name and then the message are asked.
Modus Operandi
As specified in the CISA’s advisory:
Initial Access:
Akira threat actors primarily gain initial access to organizations through a Virtual Private Network (VPN) service lacking Multi-Factor Authentication (MFA), often exploiting known vulnerabilities in Cisco systems such as CVE-2020-3259 and CVE-2023-20269. Additional methods include Remote Desktop Protocol (RDP), spear phishing, and credential abuse.
Persistence and Discovery:
After gaining initial access, Akira actors establish persistence by creating new domain accounts and utilizing domain controllers. They leverage post-exploitation techniques like Kerberoasting to extract credentials and use credential scraping tools for privilege escalation. Network scanning tools aid in reconnaissance and identifying domain controllers.
Defense Evasion:
Akira actors may deploy multiple ransomware variants within the same attack, disable security software, and terminate antivirus-related processes to avoid detection.
Exfiltration and Impact:
Tools like FileZilla and WinSCP are used for data exfiltration, while AnyDesk and Ngrok establish command and control channels. Akira utilizes a double-extortion model, encrypts systems, and demands payment in Bitcoin. They threaten to publish data on the Tor network to pressure victims.
Encryption:
Akira employs a hybrid encryption scheme combining ChaCha20 and RSA algorithms, targeting specific file types and sizes. They delete volume shadow copies (VSS) and leave ransom notes to communicate with victims.
Leveraged Tools:
Akira actors use various tools such as AdFind, Advanced IP Scanner, AnyDesk, Mimikatz, RClone, WinRAR, WinSCP, and PowerShell for reconnaissance, remote access, credential theft, exfiltration, and system manipulation.
This Modus Operandi highlights Akira’s sophisticated techniques from initial access to impact, showcasing their evasion tactics, encryption methods, and utilization of diverse tools for malicious activities. For the full details please visit CISA.
MITRE ATT&CK TTP Table
ID | Tactic & Technique | Use |
Initial Access | ||
T1078 | Valid Accounts | Akira threat actors obtain and abuse credentials of existing accounts as a means of gaining initial access. |
T1190 | Exploit Public Facing Application | Akira threat actors exploit vulnerabilities in internet-facing systems to gain access to systems. |
T1133 | External Remote Services | Akira threat actors have used remote access services, such as RDP/VPN connection to gain initial access. |
T1566.001 | Phishing: Spearphishing Attachment | Akira threat actors use phishing emails with malicious attachments to gain access to networks. |
T1566.002 | Phishing: Spearphishing Link | Akira threat actors use phishing emails with malicious links to gain access to networks. |
Credential Access | ||
T1003 | OS Credential Dumping | Akira threat actors use tools like Mimikatz and LaZagne to dump credentials. |
T1003.001 | OS Credential Dumping: LSASS Memory | Akira threat actors attempt to access credential material stored in the process memory of the LSASS. |
Discovery | ||
T1016 | System Network Configuration Discovery | Akira threat actors use tools to scan systems and identify services running on remote hosts and local network infrastructure. |
T1082 | System Information Discovery | Akira threat actors use tools like PCHunter64 to acquire detailed process and system information. |
T1482 | Domain Trust Discovery | Akira threat actors use the net Windows command to enumerate domain information. |
T1057 | Process Discovery | Akira threat actors use the Tasklist utility to obtain details on running processes via PowerShell. |
T1069.001 | Permission Groups Discovery: Local Groups | Akira threat actors use the net localgroup /dom to find local system groups and permission settings. |
T1069.002 | Permission Groups Discovery: Domain Groups | Akira threat actors use the net group /domain command to attempt to find domain level groups and permission settings. |
T1018 | Remote System Discovery | Akira threat actors use nltest / dclist to amass a listing of other systems by IP address, hostname, or other logical identifiers on a network. |
Persistence | ||
T1136.002 | Create Account: Domain Account | Akira threat actors attempt to abuse the functions of domain controllers by creating new domain accounts to establish persistence. |
Defense Evasion | ||
T1562.001 | Impair Defenses: Disable or Modify Tools | Akira threat actors use BYOVD attacks to disable antivirus software. |
Command and Control | ||
T1219 | Remote Access Software | Akira threat actors use legitimate desktop support software like AnyDesk to obtain remote access to victim systems. |
T1090 | Proxy | Akira threat actors utilized Ngrok to create a secure tunnel to servers that aided in exfiltration of data. |
Collection | ||
T1560.001 | Archive Collected Data: Archive via Utility | Akira threat actors use tools like WinRAR to compress files. |
Exfiltration | ||
T1048 | Exfiltration Over Alternative Protocol | Akira threat actors use file transfer tools like WinSCP to transfer data. |
T1537 | Transfer Data to Cloud Account | Akira threat actors use tools like CloudZilla to exfiltrate data to a cloud account and connect to exfil servers they control. |
T1567.002 | Exfiltration Over Web Service: Exfiltration to Cloud Storage | Akira threat actors leveraged RClone to sync files with cloud storage services to exfiltrate data. |
Impact | ||
T1486 | Data Encrypted for Impact | Akira threat actors encrypt data on target systems to interrupt availability to system and network resources. |
T1490 | Inhibit System Recovery | Akira threat actors delete volume shadow copies on Windows systems. |
T1657 | Financial Theft | Akira threat actors use a double-extortion model for financial gain. |
For the existing IoCs you may also visit SOCRadar Platform.
How Can SOCRadar Help?
SOCRadar’s robust defense strategy is specifically designed to combat the ransomware threat. Our proactive approach to threat monitoring and intelligence solutions is customized to bolster your organization’s security posture effectively. Through our platform, you can actively monitor and analyze threat actors like Akira, gaining in-depth insights into their strategies, targeted vulnerabilities, associations, and signs of compromise. This proactive methodology empowers you to anticipate and mitigate potential threats efficiently, protecting your critical assets.
In addition, our Attack Surface Management module, featuring the Ransomware Check function, provides continuous monitoring of all potential attack pathways. This ensures that you receive real-time notifications about any suspicious activities linked to ransomware. By staying ahead of these threats, you can promptly respond and strengthen your cybersecurity defenses, reducing the risk posed by Akira ransomware and other emerging threats.
What Are the Latest Akira News?
Akira ransomware has returned to encrypting victims’ files after a phase of focusing solely on extortion without encryption. Cisco Talos researchers, James Nutland and Michael Szeliga, observed this strategic shift, drawing comparisons to the methods used by Karakurt and Cl0p. This move aims to enhance operational efficiency within Akira’s ransomware-as-a-service (RaaS) model.
The group has also resumed using its C++ encryptor for Windows systems, abandoning its brief experimentation with Rust-based encryptors for Linux. Researchers identified the new C++ variant as similar to Akira’s original payload from late 2023, signaling a refinement of its tools rather than a full overhaul.
Akira affiliates have been exploiting vulnerabilities like CVE-2024-40766 to target both Windows and Linux systems. Their ability to adapt, testing different programming frameworks, and targeting high-impact vulnerabilities has secured Akira’s position as a leading ransomware group, especially following law enforcement actions against competitors like LockBit and ALPHV. Microsoft reported that Akira accounted for 17% of ransomware attacks in the past year, reflecting its significant role in the ransomware landscape.
For further information about this latest research refer to Talos’ report.