Understanding Akira: A Persistent Ransomware Threat
In the ever-evolving landscape of cybersecurity, staying informed about emerging threats is crucial for organizations to protect their digital assets. One such threat that has garnered attention is the ransomware group known as Akira, named after its inaugural ransomware strain unleashed in March 2023. Believed to have originated as a splinter cell from the Conti group, Akira has since established itself as a formidable adversary, employing sophisticated tactics to infiltrate and extort organizations worldwide.
Evolution of Tactics
Akira’s journey began with its initial ransomware, crafted in C++, before transitioning to a more advanced Rust-based variant called Megazord. This evolution underscores the group’s adaptability and commitment to staying ahead of cybersecurity defenses. However, what truly sets Akira apart is its adoption of a double extortion scheme. This tactic involves exfiltrating sensitive data before encrypting devices within a targeted network, amplifying the pressure on victims to comply with their demands.
Technique
Description
T1595
Active Scanning
T1589
Gather Victim Identity Information
T1590
Gather Victim Network Information
T1591.004
Gather Victim Org Information: Identify Roles
T1003.001
OS Credential Dumping: LSASS Memory
T1048
Exfiltration Over Alternative Protocol
T1021.001
Remote Services: Remote Desktop Protocol
T1059.001
Command and Scripting Interpreter: PowerShell
T1106
Native API
T1190
Exploit Public-Facing Application
T1486
Data Encrypted for Impact
T1490
Inhibit System Recovery
T1566
Phishing
T1584
Compromise Infrastructure
Target Preferences and Tactics
Akira exhibits a clear preference for victims in the United States and US-aligned countries such as the UK, Australia, and Canada. Industries such as Services & Goods, Manufacturing, Education, and Construction are among their favored targets due to their reliance on digital infrastructure and valuable data. The group employs various tactics, including dictionary attacks against Internet-exposed devices and exploiting known vulnerabilities such as CVE-2023-20269 within the Cisco ASA Authentication, Authorization, and Accounting (AAA) functionality.
Execution and Encryption
Once inside a network, Akira employs a range of tools and techniques for lateral movement, including dumping LSASS, using RDP, SMB, PCHunter64, LaZagne, and Mimikatz to harvest credentials. The group has also targeted specific vulnerabilities within backup solutions like Veeam to gain access to domain admin credentials. For exfiltration, Akira prefers tools like RClone, WinSCP, and FileZilla. Following exfiltration, Akira or Megazord encrypts files selectively, deleting volume shadow copies through PowerShell to hinder recovery efforts.
Facing the Threat
Akira’s impact on organizations is profound, with an average of 18.5 successful attacks per month and ransom demands sometimes reaching into the hundreds of millions. To mitigate the risk posed by Akira and similar ransomware groups, organizations must prioritize cybersecurity measures. This includes implementing robust incident response protocols, regularly updating software and patches to address known vulnerabilities, and educating employees about the importance of cybersecurity hygiene.
In conclusion, while the threat posed by Akira is significant, proactive measures can help organizations bolster their defenses and minimize the risk of falling victim to ransomware attacks. By remaining vigilant and adopting a multi-layered approach to cybersecurity, organizations can mitigate the impact of ransomware threats and safeguard their valuable data and assets.
Related Blogs
In this series, we highlight security professionals and their work behind the scenes. Questions are based on their experiences over their careers,…
In this series, we highlight security professionals and their work behind the scenes. Responses and opinions are based on their experiences over…
Interview with Aaron Shelmire, Chief Threat Research Officer & Co-FounderInterviewer: Can you tell us about a favorite incident that you…
Your browser does not support the video tag.
Fill out the below, and we will email you!
Name
11+4=
Email me the guide