Akira Ransomware

 

What is Akira Ransomware ?

                Akira Ransomware is designed to encrypt data, create ransomware note  and delete windows shadow valume copies on affected devices.

 

Defination of ransomeware?

·         Ransomeware attack hold data and devices hostage until a ransom is paid.

·         Example –  Sam Sam, wannacry,akira.

 

Why named Akira ?

·    Because due to its ability to modify filenames of all encrypted files by appending them with the ".akira" extension

 

How Akira Works?

·         Akira  is designed to close process or shut down windows services by encrypting files.

·         It uses VPN Services, to trick users into downloading malicious files.

·         Ransomeware also terminate active Windows services using the windows restart manager API,

·     Ransomware is designed to encrypt program data, recycle bin, boot system, volume information in system stability.

·         This negotiation site just includes a chat system that the victim can use to communicate.

 

How Ransomeware infect devices?

·         Ransomeware spread through spear phishing E-mails.

·         Drive-by-Download method a cyber attack that unintentionally downloads malicious code on device.

·         It also spread through insecure remote Desktop connection.

 

How does Akira Target?

·         Since March 2023 ransomeware has steadily built up a list of victims.

·         Target – Corporate networks like education, finance, real estate and consulting.

·         After breaching network it spreads laterally to other devices.

·         Steal -  Sensitive corporate data for leverage in their extortion attempts.

 

What can users do to protect against ransomeware?

·         Cert – Advised used to follow internet hygiene and protection protocol.

·         Update – Operating system, and networks.

·         companies must establish  domain based message authentication reporting.

·         Conformance to domain keys identified mail (DKIM)

·         Sender policy for organizational e-mail validation.

·         Enforcement of strong password policies and multifactor authentication.

 

Government of India's initiative for cyber security?

·         The Indian computer emergency response team (CERT-In)

·         National cyber crime coordination centre (I4C)

·         National Critical information Infrastructure protection centre (NCIIPC)

·         National Cyber Security policy,2013

·         Information Technology Act,2000

·         Cyber Surakshit Bharat

·         Cyber Swachhta Kendra,

·         Online Cyber crime reporting portal

·         National cyber Security strategy

·         Personal Data Protection Bill.