Akira ransomware has evolved into a notable double-extortion threat impacting hundreds of organizations and critical infrastructure since its 2023 emergence, with a distinctive leak-site presence. CISA reports over 250 impacted entities and about $42 million in ransomware proceeds by January 1, 2024. #AkiraRansomware #CISA #Megazord #AnyDesk #Ngrok
Keypoints
- Akira uses a double extortion model: exfiltrate data and encrypt devices, demanding payment to decrypt and to prevent data exposure.
- Initial history includes Windows targeting, with a Spring 2023 expansion to VMware ESXi (Linux variant) and later developments.
- Megazord (Rust-based) emerged in Aug 2023; Akira_v2 variants have been observed by independent researchers.
- Since March 2023, Akira has affected 250+ organizations across North America, Europe, and Australia, with significant US victim concentration.
- Victims span education, finance, manufacturing, and healthcare sectors; campaigns use phishing and exploiting vulnerabilities to gain access.
- Leak site behavior includes a -leaks command to list victims with torrent magnet links, signaling data availability on public fronts and Tor.
- MITRE-aligned techniques include VPN without MFA, RDP, credential dumping, domain persistence, data exfiltration with various tools, and strong encryption.
MITRE Techniques
- [T1078] Valid Accounts – Akira threat actors obtain and abuse credentials of existing accounts as a means of gaining initial access. “Akira threat actors obtain and abuse credentials of existing accounts as a means of gaining initial access.”
- [T1190] Exploit Public Facing Application – Akira threat actors exploit vulnerabilities in internet-facing systems to gain access to systems. “Akira threat actors exploit vulnerabilities in internet-facing systems to gain access to systems.”
- [T1133] External Remote Services – Akira threat actors have used remote access services, such as RDP/VPN connection to gain initial access. “Akira threat actors have used remote access services, such as RDP/VPN connection to gain initial access.”
- [T1566.001] Phishing: Spearphishing Attachment – Akira threat actors use phishing emails with malicious attachments to gain access to networks. “Akira threat actors use phishing emails with malicious attachments to gain access to networks.”
- [T1566.002] Phishing: Spearphishing Link – Akira threat actors use phishing emails with malicious links to gain access to networks. “Akira threat actors use phishing emails with malicious links to gain access to networks.”
- [T1003] OS Credential Dumping – Akira threat actors use tools like Mimikatz and LaZagne to dump credentials. “Akira threat actors use tools like Mimikatz and LaZagne to dump credentials.”
- [T1003.001] LSASS Memory – Akira threat actors attempt to access credential material stored in the process memory of the LSASS. “Akira threat actors attempt to access credential material stored in the process memory of the LSASS.”
- [T1016] System Network Configuration Discovery – Akira threat actors use tools to scan systems and identify services running on remote hosts and local network infrastructure. “Akira threat actors use tools to scan systems and identify services running on remote hosts and local network infrastructure.”
- [T1082] System Information Discovery – Akira threat actors use tools like PCHunter64 to acquire detailed process and system information. “Akira threat actors use tools like PCHunter64 to acquire detailed process and system information.”
- [T1482] Domain Trust Discovery – Akira threat actors use the net Windows command to enumerate domain information. “Akira threat actors use the net Windows command to enumerate domain information.”
- [T1057] Process Discovery – Akira threat actors use the Tasklist utility to obtain details on running processes via PowerShell. “Akira threat actors use the Tasklist utility to obtain details on running processes via PowerShell.”
- [T1069.001] Local Groups – Akira threat actors use the net localgroup /dom to find local system groups and permission settings. “Akira threat actors use the net localgroup /dom to find local system groups and permission settings.”
- [T1069.002] Domain Groups – Akira threat actors use the net group /domain command to attempt to find domain level groups and permission settings. “Akira threat actors use the net group /domain command to attempt to find domain level groups and permission settings.”
- [T1018] Remote System Discovery – Akira threat actors use nltest / dclist to amass a listing of other systems by IP address, hostname, or other logical identifiers on a network. “Akira threat actors use nltest / dclist to amass a listing of other systems by IP address, hostname, or other logical identifiers on a network.”
- [T1136.002] Create Account: Domain Account – Akira threat actors attempt to abuse the functions of domain controllers by creating new domain accounts to establish persistence. “Akira threat actors attempt to abuse the functions of domain controllers by creating new domain accounts to establish persistence.”
- [T1562.001] Impair Defenses: Disable or Modify Tools – Akira threat actors use BYOVD attacks to disable antivirus software. “BYOVD attacks to disable antivirus software.”
- [T1219] Remote Access Software – Akira threat actors use legitimate desktop support software like AnyDesk to obtain remote access to victim systems. “Akira threat actors use legitimate desktop support software like AnyDesk to obtain remote access to victim systems.”
- [T1090] Proxy – Akira threat actors utilized Ngrok to create a secure tunnel to servers that aided in exfiltration of data. “Akira threat actors utilized Ngrok to create a secure tunnel to servers that aided in exfiltration of data.”
- [T1560.001] Archive Collected Data: Archive via Utility – Akira threat actors use tools like WinRAR to compress files. “Akira threat actors use tools like WinRAR to compress files.”
- [T1048] Exfiltration Over Alternative Protocol – Akira threat actors use file transfer tools like WinSCP to transfer data. “Akira threat actors use file transfer tools like WinSCP to transfer data.”
- [T1537] Transfer Data to Cloud Account – Akira threat actors use tools like CloudZilla to exfiltrate data to a cloud account and connect to exfil servers they control. “Akira threat actors use tools like CloudZilla to exfiltrate data to a cloud account and connect to exfil servers they control.”
- [T1567.002] Exfiltration Over Web Service: Exfiltration to Cloud Storage – Akira threat actors leveraged RClone to sync files with cloud storage services to exfiltrate data. “Akira threat actors leveraged RClone to sync files with cloud storage services to exfiltrate data.”
- [T1486] Data Encrypted for Impact – Akira threat actors encrypt data on target systems to interrupt availability to system and network resources. “Akira threat actors encrypt data on target systems to interrupt availability to system and network resources.”
- [T1490] Inhibit System Recovery – Akira threat actors delete volume shadow copies on Windows systems. “Akira threat actors delete volume shadow copies on Windows systems.”
- [T1657] Financial Theft – Akira threat actors use a double-extortion model for financial gain. “Akira threat actors use a double-extortion model for financial gain.”
Indicators of Compromise
- [URL] Magnet link – torrent magnet link to access the alleged leaked files – example: magnet link (no exact string provided in article).
- [File Extension] .akira – encrypted files originally associated with early Akira variants.
- [File Extension] .powerranges – Rust-based Megazord variant extension observed since Aug 2023.
- [TTP Tool/Artifact] AnyDesk – used as a remote access tool for commands and control.
- [TTP Tool/Artifact] Ngrok – used to create secure tunnels for exfiltration.
- [Tool/Artifact] WinSCP – used for data exfiltration.
- [Tool/Artifact] WinRAR – used to archive collected data.
- [Tool/Artifact] CloudZilla – used to exfiltrate data to cloud accounts.
Read more: https://socradar.io/dark-web-profile-akira-ransomware/