Akira Ransomware: A Growing Threat with $42 Million in Ransom Payments

Overview of the Akira Ransomware Threat
The cybersecurity landscape is buzzing with alarming news following a joint advisory issued by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), Europol, and the Netherlands’ National Cyber Security Centre (NCSC-NL). According to reports, the Akira ransomware has emerged as a formidable threat, breaching over 250 entities worldwide and receiving $42 million in ransom payments since its inception in early 2023.
The Rise and Modus Operandi of Akira
Launched in March 2023, Akira ransomware quickly made headlines by targeting a diverse array of industries. Victims include organizations in education, finance, and real estate sectors, highlighting Akira’s broad appeal and indiscriminate targeting strategy. What sets this ransomware apart is its double extortion model: attackers not only encrypt data but also exfiltrate sensitive information beforehand, threatening to release it if the ransom isn’t paid.
Earlier iterations of the malware used C++ and appended the .akira extension to compromised files. However, a significant evolution occurred in August 2023, when Akira began utilizing a new variant known as Megazord, which is powered by Rust-based code and encrypts files with a .powerranges extension. This shift illustrates the ongoing adaptability of cybercriminals in their methodologies.
Initial Access and Exploitation Tactics
Cybersecurity researchers have traced Akira’s initial breaches back to the exploitation of vulnerabilities in virtual private network (VPN) services devoid of multi-factor authentication (MFA). Vulnerabilities identified include Cisco flaws such as CVE-2020-3259 and CVE-2023-20269.
Once in, the attackers employ a range of techniques including Remote Desktop Protocol (RDP) access, spear phishing campaigns, and leveraging valid credentials. This multifaceted approach underscores the importance of robust security measures, as many organizations remain vulnerable to such tactics.
Establishing Persistence and Escalating Privileges
After gaining an initial foothold, Akira threat actors often leverage domain controller functions to maintain persistent access. By creating new domain accounts—sometimes named itadm—the attackers can infiltrate deeper into the organization’s infrastructure. They leverage advanced techniques, such as Kerberoasting, to extract credentials from memory, utilizing tools like Mimikatz and LaZagne for privilege escalation.
Moreover, reconnaissance is a critical phase in their attack strategy. They deploy tools like SoftPerfect and Advanced IP Scanner to map out the network, while standard Windows commands assist in identifying domain controllers and trust relationships, further aiding their lateral movements within compromised networks.
Dual Variant Deployment and Evasion Tactics
What particularly stands out in Akira’s operations is the simultaneous deployment of multiple ransomware variants within the same attack. This adaptive strategy is a tactic yet to be widely documented in ransomware attacks, demonstrating the group’s innovative approach to infliction of damage.
To avoid detection by security systems, the threat actors frequently disable antivirus and security software, often employing PowerTool to exploit drivers and terminate related processes. This clever maneuvering helps them to sustain their operations without interruption.
Data Exfiltration and Command-and-Control Communication
For data exfiltration, Akira uses popular tools like FileZilla, WinRAR, WinSCP, and RClone. They establish command-and-control communication via a variety of services, including AnyDesk, Cloudflare Tunnel, and Ngrok. These operational details reflect a level of sophistication rarely seen in ransomware operations, allowing them to maintain control over compromised environments effectively.
Advanced Encryption Techniques
What truly adds a layer of complexity to Akira ransomware is its hybrid encryption scheme. By combining the speed of the ChaCha20 stream cipher with the robustness of an RSA public-key cryptosystem, the operators ensure that the encryption process is both efficient and secure. This multilayered approach adapts to different file types and sizes, capable of executing full or partial encryption.
This sophisticated encryption methodology is designed to maximize operational effectiveness while complicating victims’ recovery efforts.
In summary, the emergence and evolution of the Akira ransomware strain illustrate the dynamic and perilous nature of the cyber threat landscape. With an impressive toll of $42 million in ransom payments from a multitude of sectors, the ongoing vigilance and adaptation of cybersecurity measures are paramount in combating such threats.