HomeCII/OTNewbie Akira Ransomware Gains Traction Through Transition to Linux

Newbie Akira Ransomware Gains Traction Through Transition to Linux

Published on

spot_img

The fledgling Akira ransomware group has recently expanded its target base by adding capabilities to exploit Linux systems, according to researchers. The group, which gained notoriety in April of this year, primarily focused on attacking Windows systems. However, it has now developed a new version of its ransomware that can exploit systems running the open-source Linux operating system.

Cybersecurity researchers from Cyble Research and Intelligence Labs (CRIL) discovered Akira’s shift towards Linux. In a blog post published on June 29, they highlighted the increasing vulnerability of Linux systems to cyber threats, as demonstrated by the attention of a previously Windows-centric ransomware group.

This move by Akira reflects a growing trend among ransomware groups, including more established ones such as Cl0p, Royal, and IceFire. These groups have also expanded their target base to include Linux systems due to the growing popularity of Linux in enterprise environments. Linux has become the de facto standard for running virtual container-based systems, which often support Internet of Things (IoT) devices and mission-critical applications.

The researchers further revealed that Akira has been rapidly expanding its operations and has already compromised 46 publicly disclosed victims in just a few months. The majority of these victims are located in the United States. While victims come from various industries, the education sector appears to be the most affected, followed by manufacturing, professional services, BFSI (Banking, Financial Services, and Insurance), and construction. Other victims are spread across sectors including agriculture and livestock, food and beverage, IT and ITES, real estate, consumer goods, automotive, chemical, and others.

Akira’s primary focus is on compromising and stealing data from its victims, using double-extortion tactics. They threaten to leak the victims’ data on the Dark Web if the requested ransom is not paid.

The new Linux ransomware file used by Akira infects systems through a console-based 64-bit executable written in Microsoft Visual C/C++ compiler. After execution, it retrieves a list of logical drives using the API function “GetLogicalDriveStrings().” The malware then drops a ransom note in multiple folders and proceeds to search for files and directories to encrypt using the API functions “FindFirstFileW()” and “FindNextFileW().”

To encrypt the victim’s machine, the ransomware employs the “Microsoft Enhanced RSA and AES Cryptographic Provider” libraries along with specific functions from CryptoAPI. Encrypted files are renamed with the “.akira” extension. Additionally, the ransomware includes a feature that prevents system restoration by executing a PowerShell command to delete the shadow copy.

The dropped ransom note provides instructions for victims to contact Akira and negotiate ransom payment terms. To pressure victims, the group threatens to leak their data on its ransomware site, which displays a list of non-paying victims and associated data leaks.

Researchers have provided several recommendations to prevent and mitigate ransomware attacks. These include regular backup practices conducted offline or on a separate network, enabling automatic software updates, using reliable antivirus and Internet security software, and refraining from opening untrusted links and email attachments without verification.

In the event of a ransomware attack, organizations should immediately detach infected devices, disconnect any connected external storage devices, and inspect system logs for suspicious events to minimize network damage.

The expansion of Akira’s target base to include Linux systems highlights the growing vulnerability of these systems to ransomware attacks. It also indicates a broader trend among ransomware groups to exploit the popularity of Linux in enterprise environments. As the cybersecurity landscape evolves, organizations must remain vigilant and employ proactive measures to protect their systems from ever-evolving cyber threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...