Introduction: This analysis delves into the Akira ransomware, which emerged in March 2023. Noteworthy for its retro aesthetic on the Data Leak Site (DLS) and messaging, Akira employs multi-extortion tactics. The threat actors operate a TOR-based (.onion) website, listing victims and their stolen data if ransom demands are not met. Negotiations commence through a TOR-based portal using a unique identifier provided in the ransom note. Akira demands exorbitant ransoms, often reaching hundreds of millions of dollars.
Targeted Sectors: Akira does not discriminate in victimology, targeting large enterprises across various industries, including education, finance, manufacturing, real estate, and healthcare.
Attack Techniques: Akira gains initial access by exploiting public-facing services or applications, often targeting weaknesses in multi-factor authentication (MFA) and known vulnerabilities in VPN software. Credential dumping, lateral movement, and privilege escalation are pursued through techniques like LSASS dumps and the use of other tools like PCHunter64. The ransomware, upon launch, executes PowerShell commands to remove volume shadow copies (VSS), appends the .akira extension to encrypted files, and employs the Windows Restart Manager (WRM) API for file locking issues.
Detection Strategies: EDR solutopns can identify Akira-related malicious activities, organizations without this specific security solution can adopt a multi-layered detection approach:
Mitigation Measures: , the following steps can help mitigate the risk of Akira ransomware attacks:
A comprehensive approach, encompassing awareness, preventive measures, and recovery strategies, is essential to safeguard against ransomware threats like Akira.
Back