HomeSecurity OperationsWho is behind the hacker group?

Who is behind the hacker group?

Published on

spot_img

The emergence of Akira Ransomware has caused a stir in the cybersecurity world, with its unique tactics and connection to the notorious Conti ransomware gang. With a focus on double extortion and a Ransomware-as-a-Service (RaaS) distribution model, Akira is quickly gaining traction as one of the fastest-growing ransomware families in recent times.

According to a recent report that analyzed blockchain and source code data, Akira appears to be linked to the now-defunct Conti ransomware gang, known for its sophisticated attack methods. Conti itself is believed to have descended from the highly targeted Ryuk ransomware, showcasing the evolution of ransomware actors and their tactics over time.

As organizations face increasingly complex threats from ransomware groups like Akira, there is a pressing need to enhance cybersecurity measures to effectively defend against these attacks. The Akira ransomware, which first emerged in March 2023, primarily targets businesses in the US and Canada, utilizing a unique retro-themed Tor Leak site reminiscent of 1980s green screen consoles.

While the Akira ransomware exhibits similarities to Conti in its code and tactics, the operators behind these attacks are focused on financial gains. Using double extortion tactics, they not only encrypt devices and files but also steal vital data from victims. Interestingly, the Akira operators offer victims the option to pay for either file decryption or data deletion, with ransom demands ranging from $200,000 to over four million dollars.

Recent activities of Akira Ransomware have seen the group expanding its target list to include Linux computers and targeting Cisco VPN accounts lacking multi-factor authentication. Exploiting a zero-day vulnerability in Cisco VPN features, Akira has been able to establish unauthorized remote access VPN sessions, posing a significant threat to organizations using Cisco products.

A variant of Akira Ransomware called Megazord, named after the Power Rangers formation, emerged in August and encrypts files with the POWERRANGES extension. Victims are instructed to contact the ransomware actor via TOX Messenger, indicating the evolving nature of Akira’s tactics and communication methods.

With its primary targets in France and an increase in attack attempts observed in June 2023, Akira remains a potent threat to organizations worldwide. The recent analysis of the Akira Leak Site reveals that the victims are mainly small companies in North America, with sectors like academia, professional services, construction, and materials being the most targeted.

The chain of infection and techniques used by Akira actors involves gaining access through compromised VPN credentials, creating new domain accounts, and bypassing security measures using various tools. The impact of Akira Ransomware is significant, with the encryption of systems and deletion of shadow copies to prevent recovery, showcasing the sophistication of modern ransomware operations.

In conclusion, the rise of Akira Ransomware highlights the evolving landscape of cyber threats and the need for organizations to bolster their cybersecurity defenses against sophisticated ransomware attacks. As ransomware groups continue to innovate and leverage new tactics, proactive measures and robust security protocols are crucial in mitigating the risks posed by threats like Akira.

Source link

Latest articles

MIWIC26: Nicole Bucala, CEO of DataBee, a Comcast Company

The "Most Inspiring Women in Cyber Awards," organized by Eskenzi PR in partnership with...

Advenica Introduces File Scanner Kiosk to Combat USB Malware

Advenica Unveils Advanced File Scanner Kiosk to Combat USB Malware Threats Advenica, a Swedish cybersecurity...

Google Secures Chrome Sessions on Devices to Prevent Cookie Theft

Google Introduces Device Bound Session Credentials to Combat Session Hijacking In a significant advancement in...

CISO Checklist: Evaluating Cybersecurity Platforms vs. Marketing Tactics

Cybersecurity Expo Draws 600+ Vendors Amid Growing Market Challenges The RSAC 2026 Conference at the...

More like this

MIWIC26: Nicole Bucala, CEO of DataBee, a Comcast Company

The "Most Inspiring Women in Cyber Awards," organized by Eskenzi PR in partnership with...

Advenica Introduces File Scanner Kiosk to Combat USB Malware

Advenica Unveils Advanced File Scanner Kiosk to Combat USB Malware Threats Advenica, a Swedish cybersecurity...

Google Secures Chrome Sessions on Devices to Prevent Cookie Theft

Google Introduces Device Bound Session Credentials to Combat Session Hijacking In a significant advancement in...