HomeSecurity OperationsWho is behind the hacker group?

Who is behind the hacker group?

Published on

spot_img

The emergence of Akira Ransomware has caused a stir in the cybersecurity world, with its unique tactics and connection to the notorious Conti ransomware gang. With a focus on double extortion and a Ransomware-as-a-Service (RaaS) distribution model, Akira is quickly gaining traction as one of the fastest-growing ransomware families in recent times.

According to a recent report that analyzed blockchain and source code data, Akira appears to be linked to the now-defunct Conti ransomware gang, known for its sophisticated attack methods. Conti itself is believed to have descended from the highly targeted Ryuk ransomware, showcasing the evolution of ransomware actors and their tactics over time.

As organizations face increasingly complex threats from ransomware groups like Akira, there is a pressing need to enhance cybersecurity measures to effectively defend against these attacks. The Akira ransomware, which first emerged in March 2023, primarily targets businesses in the US and Canada, utilizing a unique retro-themed Tor Leak site reminiscent of 1980s green screen consoles.

While the Akira ransomware exhibits similarities to Conti in its code and tactics, the operators behind these attacks are focused on financial gains. Using double extortion tactics, they not only encrypt devices and files but also steal vital data from victims. Interestingly, the Akira operators offer victims the option to pay for either file decryption or data deletion, with ransom demands ranging from $200,000 to over four million dollars.

Recent activities of Akira Ransomware have seen the group expanding its target list to include Linux computers and targeting Cisco VPN accounts lacking multi-factor authentication. Exploiting a zero-day vulnerability in Cisco VPN features, Akira has been able to establish unauthorized remote access VPN sessions, posing a significant threat to organizations using Cisco products.

A variant of Akira Ransomware called Megazord, named after the Power Rangers formation, emerged in August and encrypts files with the POWERRANGES extension. Victims are instructed to contact the ransomware actor via TOX Messenger, indicating the evolving nature of Akira’s tactics and communication methods.

With its primary targets in France and an increase in attack attempts observed in June 2023, Akira remains a potent threat to organizations worldwide. The recent analysis of the Akira Leak Site reveals that the victims are mainly small companies in North America, with sectors like academia, professional services, construction, and materials being the most targeted.

The chain of infection and techniques used by Akira actors involves gaining access through compromised VPN credentials, creating new domain accounts, and bypassing security measures using various tools. The impact of Akira Ransomware is significant, with the encryption of systems and deletion of shadow copies to prevent recovery, showcasing the sophistication of modern ransomware operations.

In conclusion, the rise of Akira Ransomware highlights the evolving landscape of cyber threats and the need for organizations to bolster their cybersecurity defenses against sophisticated ransomware attacks. As ransomware groups continue to innovate and leverage new tactics, proactive measures and robust security protocols are crucial in mitigating the risks posed by threats like Akira.

Source link

Latest articles

Why Third-Party Risk Is the Biggest Gap in Your Security Posture

  Executive Summary The next major breach hitting an organization probably won't come from inside...

Free VPNs Expose Data Despite Privacy Promises

The Hidden Threats of Free Android VPNs: A Comprehensive Analysis In recent years, free Virtual...

Google Addresses Fourth Chrome Zero-Day Vulnerability This Year

Google Responds Swiftly to Emerging Threats with Chrome Patch In a proactive move to safeguard...

New Progress ShareFile Vulnerabilities Expose Servers to Unauthorized Remote Takeover

Critical Exploit Chain Discovered in Progress ShareFile Storage Zone Controller The cybersecurity landscape has recently...

More like this

Why Third-Party Risk Is the Biggest Gap in Your Security Posture

  Executive Summary The next major breach hitting an organization probably won't come from inside...

Free VPNs Expose Data Despite Privacy Promises

The Hidden Threats of Free Android VPNs: A Comprehensive Analysis In recent years, free Virtual...

Google Addresses Fourth Chrome Zero-Day Vulnerability This Year

Google Responds Swiftly to Emerging Threats with Chrome Patch In a proactive move to safeguard...