Special Features

Cybersecurity Month

Akira ransomware is encrypting victims again following pure extortion fling

Crooks revert to old ways for greater efficiency


Experts believe the Akira ransomware operation is up to its old tricks again, encrypting victims' files after a break from the typical double extortion tactics.

That's according to James Nutland and Michael Szeliga, security researchers at Cisco Talos, who noted that the decision to revert to old ways is a sign the group is looking for greater stability and efficiency from its affiliate program.

Between the two periods of using double extortion tactics, Akira affiliates were mostly just stealing data and holding it to ransom – no encryption involved – à la Karakurt in 2022, or Cl0p a year later.

The pair suspect "with low to moderate confidence" that the reason for the break was to allow time for the operation's core dev team to work up a new, more effective encryptor payload.

Akira had initially launched with a C++ encryptor for Windows targets and later developed a Rust-based version for Linux systems.

However, Nutland and Szeliga noted that as recently as September, there were signs of Akira reverting to using samples written in C++ that bore resemblances to its first payload before August 2023.

The payload was updated – it's not a carbon copy of the first – but it's largely similar and appears to show a deliberate consolidation of the group's tools.

After pivoting from the first Akira payload in late 2023, the group was using two different encryptors, the Megazord variant for Windows and the Rust-based Akira v2 for Linux.

"The exploration of the Rust programming language in recent Linux encryptors signals the threat actor's willingness to experiment with different coding frameworks, potentially leading to more developed and resilient ransomware variants," the pair blogged.

"While the return to an earlier variant indicates a potential tactical shift from this code migration, it also demonstrates that the developers remain highly adaptable, willing to reemploy tried-and-tested techniques when necessary to ensure operational stability.

"Pragmatic adaptability is providing significant advantages for ransomware groups operating in a dynamic threat landscape, as it allows them to maintain a robust and reliable codebase while continually seeking new ways to evade detection and enhance functionality."

Going forward, the researchers expect Akira to continue exploiting high-impact vulnerabilities and targeting ESXi and Linux systems. Doing so allows affiliates to wreak havoc on multiple VMs and critical workloads at once, causing maximum disruption for victims.

"We anticipate Akira will continue refining its tactics, techniques, and procedures (TTPs), developing its attack chain, adapting to shifts in the threat landscape, and striving for greater effectiveness in its RaaS operations, targeting both Windows and Linux-based enterprise environments," the researchers said.

In its bumper annual cybersecurity report, Microsoft said it believed Akira was the most prolific ransomware group in the post-LockBit era, sweeping up 17 percent of all attacks for the previous 12-month period.

The group is believed to have benefited from the law enforcement disruptions of both LockBit and ALPHV/BlackCat, bringing their top talent into its own affiliate roster. That, combined with an ever-evolving catalog of TTPs, has propelled the group to the top of the cybercrook tree.

"Their success is partly due to the fact that they are constantly evolving," said Talos. "For example, after Akira already developed a new version of their ransomware encryptor earlier in the year, we just recently observed another novel iteration of the encryptor targeting Windows and Linux hosts alike."

To stay protected from Akira's attacks, the first port of call for any organization should be awareness of the vulnerabilities the group tends to exploit and patch them up with haste.

Nutland and Szeliga said recent incidents have involved exploits of the critical SonicWall vulnerability, CVE-2024-40766, although our recent talks with experts and advisories from the likes of CISA noted that bugs as old as four years are also firmly in Akira's tool belt.

"As Akira continuously refines its ransomware, affiliates are equally proactive in selecting and exploiting new vulnerabilities for initial access, adapting their tactics in tandem," the researchers said.

"They leverage newly disclosed CVEs, not only to breach networks but also to escalate privileges and move laterally within compromised environments. This allows them to establish a greater foothold to swiftly deploy encryption and exfiltrate victim data for extortion."

In addition to exploiting vulnerabilities, Akira affiliates are also known for using compromised VPN credentials for initial access.

The other most common initial access techniques used by ransomware crooks are identity compromise and social engineering – email phishing, voice phishing, SMS phishing… all the phishings, really, according to Microsoft's report.

So, for organizations looking to protect themselves from ransomware, getting on top of these methods and implementing adequate detection measures is vital to remain encryption-free.

Also, for the second year running, Microsoft said the vast majority of ransomware incidents that involved encryption (92 percent) stemmed from unmanaged devices connected to the corporate network.

It's yet another factor for defenders to consider, especially those working in industries such as manufacturing, or the professional, scientific, and technical services. Talos's data suggests these are most at risk of being targeted by Akira, based on an analysis of its previous victims. ®

Send us news
2 Comments

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

Heart surgery device maker's security bypassed, data encrypted and stolen

Sounds like th-aorta get this sorted quickly

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

Blue Yonder ransomware termites claim credit

Also: Mystery US firm compromised by Chinese hackers for months; Safe links that aren't; Polish spy boss arrested, and more

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Infosec experts divided on AI's potential to assist red teams

Yes, LLMs can do the heavy lifting. But good luck getting one to give evidence