HomeCyber BalkansNew Decrypter Released for the Infamous Akira Ransomware

New Decrypter Released for the Infamous Akira Ransomware

Published on

spot_img

Avast researchers have recently made a breakthrough in decrypting files affected by the Akira ransomware. Since its appearance in 2017, Akira ransomware has been targeting various organizations, including those in the education, finance, and real estate sectors. Unlike most ransomware, Akira does not leave any ransom notes after encrypting the files, making it difficult for victims to know how to recover their data.

Akira ransomware is specifically designed for Windows platforms and utilizes a 64-bit Windows binary for encrypting files. It is written in C++ and relies heavily on C++ libraries. The ransomware uses symmetric encryption, with the encryption key generated by the CryptGenRandom() function in the Windows CryptAPI. It also employs ChaCha 2008 for encrypting files on affected systems.

Researchers have found that Akira ransomware has even affected Linux operating systems, using the Crypto++ library as a substitute for Windows CryptAPI. The ransomware excludes certain folders and file extensions from encryption by default. For example, it does not encrypt .exe, .dll, .lnk, .sys, and .msi files, as well as Akira_readme.txt. It also excludes folders such as “winnt,” “temp,” “thumb,” “$Recycle.bin,” “$RECYCLE.BIN,” “System Volume Information,” “Boot,” “Windows,” and “Trend Micro.”

Interestingly, there are similarities between Akira ransomware and Conti V2 Ransomware. Both ransomware strains share a list of excluded files and folders, use ChaCha 2008, and rely on CryptGenRandom and CryptEncrypt functions. Avast researchers believe that the authors of Akira ransomware may have drawn inspiration from Conti in developing their malware.

Avast has released a decryptor tool for Akira ransomware, offering both 64-bit and 32-bit versions for users to download. The decryptor tool requires users to submit two identical files—one original file and the other a file affected by Akira ransomware with the .akira extension. The tool then works to decrypt the files, which may take some time depending on the complexity of the encryption. Once the decryption process is complete, the tool prompts users to back up the decrypted files using the provided wizard.

In order to further assist users, Avast has provided a complete report and instructions on how to use the decryptor tool on their website. This resource guides users through the decryption process step by step.

It is worth noting that Akira ransomware uses a symmetric RSA-4096 cipher encryption key, which is appended at the end of the encrypted file. The public key, on the other hand, is hardcoded within the ransomware binary.

As the threat landscape continues to evolve, it is crucial for security researchers and organizations to work together to develop effective countermeasures. Avast’s success in decrypting Akira ransomware files showcases the importance of ongoing research in fighting against such malicious threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...