Akira Ransomware
- August 1, 2023
- Posted by: OptimizeIAS Team
- Category: DPN Topics
No Comments
Akira Ransomware
Subject : Science and technology
Section: Awareness in IT
Context:
The Computer Emergency Response Team of India has issued an alert for the ransomware dubbed “Akira.”
What is Ransomware?
Ransomware is malicious software that encrypts a victim’s files or computer system and demands a ransom for decryption.
For example, WannaCry: A widespread ransomware attack that occurred in 2017, affecting hundreds of thousands of computers worldwide.
What is Akira Ransomware?
- Target both Windows and Linux devices
- Forces victims to pay double ransom for decryption and recovery
- Designed to encrypt data, create a ransomware note and delete Windows Shadow Volume copies on affected devices.
- Modifies file name with ‘.akira’
- Close processes on system which may keep it from encrypting
- Uses VPN services
- Deletes the Windows Shadow Volume copies on the affected device
What is VSS Services?
- Volume shadow copy services (VSS) can create backup copies or snapshots of computer files or volumes, even when they are in use.
How does Akira ransomware work?
- Terminates active Windows services preventing any interference with the encryption process.
- Does not encrypt system files and components essential for stability of system.
- Once sensitive data is stolen, leaves behind a note containing –
- Information about attack
- Link to leak and negotiation site
- Each victim is given a unique negotiation password to be entered into the threat actor’s Tor site to negotiate with ransomware gang.
What is dark web and tor site?
- The dark web is a hidden part of the internet, accessible only through specialized software like the Tor browser, known for its anonymity and hosting illegal activities.
- Tor—short for the Onion Routing project—is an open-source privacy network that enables anonymous web browsing.
How ransomware infects devices?
- Phishing emails with malicious attachments.
- Drive-by-download
- a cyberattack that unintentionally downloads malicious code onto a device.
- Specially crafted web links in emails – downloads malicious code.
- Exploiting Software Vulnerabilities
- Malvertising
- use of malicious advertisements (malvertising) on legitimate websites to redirect users to sites hosting ransomware
- Infected Software
- Remote Desktop Protocol (RDP) Attacks
- External Devices
- File-sharing Networks
How to protect against ransomware?
- CERT-In has advised users to follow basic internet hygiene and protection protocols
- Includes maintaining up to date offline backups of critical data, to prevent data loss in the event of an attack.
- Use of Reliable Security Software
- Keeping Software Updated
- Exercising Caution with Email
- Enabling Macro Security
- Avoiding Suspicious Websites
- Backup Data Regularly
- Using Strong and Unique Passwords
- Disabling Remote Desktop Services (if not needed)
- Educating Users about Ransomware Risks
- Staying Informed about Latest Threats and Security Best Practices.