HomeRisk ManagementsProactive CISO strategies for Akira ransomware prevention and defense - Source: www.cybertalk.org

Proactive CISO strategies for Akira ransomware prevention and defense – Source: www.cybertalk.org

Published on

spot_img

In March of 2023, the Akira ransomware strain was first detected, and since then, the group has targeted over 100 different organizations in various sectors, including financial, manufacturing, real estate, healthcare, and medical. The group operates on a Ransomware-as-a-Service (RaaS) model and employs a double-extortion scheme by exfiltrating sensitive data before encrypting devices and then demanding a ransom in exchange for not releasing the data to their TOR leak site.

Most recently, the Akira ransomware interrupted a U.S. emergency dispatch system, resulting in a nine-day operational outage. During this period, dispatchers had to rely on backup systems, and as of the latest update, the full restoration of the system is still underway.

The Akira ransomware gang is known for its retro aesthetic, reminiscent of 1980s green screen consoles, and has been linked to the notorious Conti ransomware operation through cryptocurrency transactions, indicating a potential association between the two groups.

The group typically gains unauthorized access to organizations’ VPNs using compromised username/password combinations, allowing them to move laterally within the network and exploit various vulnerabilities in the system. The use of tools and techniques such as Remote Desktop Protocol (RDP) and service manager tools helps them gain persistent access within systems and evade security defenses.

The Akira ransomware group relies on a command and control (C2) mechanism to execute their activities, establishing communication with compromised machines and exerting control over the network. They also employ various tools for data exfiltration and utilize a combination of AES and RSA algorithms for data encryption, complicating the process of data restoration for victims.

To prevent and defend against Akira ransomware attacks, organizations are advised to enhance their identity and access management, store credentials securely, and proactively patch and monitor their network for unusual activities. Additionally, securing C2 channels and remote desktop protocols, implementing endpoint protection, and regularly updating security solutions are recommended measures to mitigate the risk of Akira ransomware attacks.

Source link

Latest articles

The Cybersecurity Game of Cat and Mouse

In the ever-evolving landscape of cybersecurity, the battle between threat actors and defenders continues...

Spy agencies describe ramped up election influence in latest check-in

U.S. intelligence agencies have issued a warning that foreign actors are intensifying their efforts...

How I Responded to Hackers Targeting Me – AARP

When faced with a cyber attack, many people may feel overwhelmed and unsure of...

September 2024 Patch Tuesday forecast: Downgrade is the new exploit

In the latest Patch Tuesday update for August 2024, Microsoft released a limited set...

More like this

The Cybersecurity Game of Cat and Mouse

In the ever-evolving landscape of cybersecurity, the battle between threat actors and defenders continues...

Spy agencies describe ramped up election influence in latest check-in

U.S. intelligence agencies have issued a warning that foreign actors are intensifying their efforts...

How I Responded to Hackers Targeting Me – AARP

When faced with a cyber attack, many people may feel overwhelmed and unsure of...
en_USEnglish