BTC $70823.7516
ETH $3531.0259
BNB $621.2790
SOL $172.6448
stETH $3527.9907
XRP $0.6083
DOGE $0.1997
TON $7.2456
ADA $0.5853
AVAX $46.2175
wstETH $4100.4456
DOT $8.4402
BCH $607.1354
WETH $3536.6758
WBTC $70909.4458
TRX $0.1219
LINK $17.6560
MATIC $0.8809
UNI $9.0821
ICP $15.6959
LTC $97.8636
CAKE $3.7041
DAI $0.9996
IMX $2.5675
ETC $33.6641
RNDR $9.1096
FIL $8.1342
STX $2.9994
MNT $1.2895
NEAR $6.8343
TAO $615.5692
VET $0.0503
ATOM $10.8915
HBAR $0.0996
OKB $56.9032
FDUSD $1.0028
WIF $3.3890
KAS $0.1440
MKR $3344.9389
PEPE $0.0000
GRT $0.3114
THETA $2.8807
INJ $31.7467
FET $2.5067
XLM $0.1297
XMR $134.0517
USDE $1.0001
BTC $70823.7516
ETH $3531.0259
BNB $621.2790
SOL $172.6448
stETH $3527.9907
XRP $0.6083
DOGE $0.1997
TON $7.2456
ADA $0.5853
AVAX $46.2175
wstETH $4100.4456
DOT $8.4402
BCH $607.1354
WETH $3536.6758
WBTC $70909.4458
TRX $0.1219
LINK $17.6560
MATIC $0.8809
UNI $9.0821
ICP $15.6959
LTC $97.8636
CAKE $3.7041
DAI $0.9996
IMX $2.5675
ETC $33.6641
RNDR $9.1096
FIL $8.1342
STX $2.9994
MNT $1.2895
NEAR $6.8343
TAO $615.5692
VET $0.0503
ATOM $10.8915
HBAR $0.0996
OKB $56.9032
FDUSD $1.0028
WIF $3.3890
KAS $0.1440
MKR $3344.9389
PEPE $0.0000
GRT $0.3114
THETA $2.8807
INJ $31.7467
FET $2.5067
XLM $0.1297
XMR $134.0517
USDE $1.0001
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Akira extortion gang attacks corporate networks around the world

    "Merciful hackers" are loyal in discussing ransom money and are ready to provide each victim with individual options.

    A new group of cybercriminals called Akira has been attacking corporate networks around the world in recent months, encrypting files and demanding ransoms up to several million dollars. Akira representatives say they have already carried out attacks on sixteen companies from various industries since March this year, including education, finance, real estate, manufacturing and consulting.

    While a ransomware virus with the same name already existed in 2017, it is unlikely that these operations are related. Akira ransomware sample discovered by MalwareHunterTeam deletes Windows shadow copies on the device on startup and then proceeds to file encryption process, skipping files found in some system folders such as Recycle Bin, System Volume Information, Boot , "ProgramData" and "Windows".

    The virus also avoids encrypting Windows system files with the extensions ".exe", ".lnk", ".dll", ".msi" and ".sys" and is also capable of stopping system processes or services that may interfere with encryption.

    The virus adds the “.akira” extension to already encrypted files. For example, a file named "Report.doc" will be encrypted and renamed to "Report.doc.akira".

    When the attackers obtain the credentials of a Windows domain administrator, they also launch the virus throughout the corporate network, effectively infecting all connected devices. Like many other ransomware gangs, prior to the actual encryption process, cybercriminals steal corporate data to use as additional leverage.

    At the end of the encryption, the malware places a ransom note called “akira_readme.txt” in every folder on the computer. It contains information about what happened to the victim's files and leads to a data breach site where it is possible to open a chat with criminals using a unique identifier and password.

    “In regards to the stolen data, if we cannot agree, we will try to sell your personal information / trade secrets / databases / source codes - anything that has any value on the black market. And then all the data will be published on our blog,” black hackers threaten in their note.

    The Akira gang put a lot of effort into their data breach site, giving it a retro look and navigating like terminal interfaces.

     

    At the time of this writing, Akira has published the details of four victims on its data breach website. The size of the leaked data varies from 6 GB to 260 GB. Ransom demands are also adjusted individually by cyberthugs, depending on the size of the company and the amount of data stolen. The minimum ransom requested was reportedly $200,000 and the maximum ransom was several million.

    Experts do not yet recommend paying ransomware to attackers, as the malware is still being analyzed, and perhaps, as is the case with many other ransomware programs, it will be possible to develop a decryptor capable of recovering encrypted data for free.

    However, the hackers seem to have foreseen this option, so they are ready to lower the ransom requirements for companies that do not need a decryptor and simply want to prevent the public leakage of stolen data.

    Author DeepWeb
    RapperBot botnet combines DDoS and cryptojacking: new versions target IoT devices
    Unusual phishing campaign using memes as malware variables

    Comments 0

    Add comment