Akira Ransomware Gang Extorts $42 Million
by BetaT - Friday April 19, 2024 at 03:41 PM
#1
Akira ransomware encrypts targeted systems using a hybrid encryption algorithm that combines Chacha20 and RS, Trend Micro said in an analysis of the ransomware published in October 2023.

Additionally, the Akira ransomware binary, has a feature that allows it to inhibit system recovery by deleting shadow copies from the affected system.

The double-extortion group has been observed using a C++ variant of the locker in the early stages, before shifting to a Rust-based code as of August 2023.

Initial access to target networks is facilitated by means of exploiting known flaws in Cisco appliances (e.g., CVE-2020-3259 and CVE-2023-20269).
Reply
#2
I always wondered what they would do with that money, I guess it would be to treat themselves to some luxuries or rent servers, I don't know, we are seeing a new generation of ransomware, every day they become more robust, interesting
Reply
#3
i have a feeling we'll see more crypters coded in rust before long
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Gmail breach is real or not? dai5 5 411 2 hours ago
Last Post: dai5
  Canvas login portals hacked in mass ShinyHunters extortion campaign namenonamen 1 89 3 hours ago
Last Post: felowfren
  Zara data breach exposed personal information of 197,000 people namenonamen 1 73 5 hours ago
Last Post: darkbigfoot
  Critical vm2 sandbox bug lets attackers execute code on hosts namenonamen 0 75 5 hours ago
Last Post: namenonamen
  Where to buy The Best POE Patch 3.28 & POE 2 Currency? salisy 2 141 5 hours ago
Last Post: namenonamen

Forum Jump:


 Users browsing this forum: 1 Guest(s)