National Cyber Warfare Foundation (NCWF)

Akira


1 user ratings
2024-06-18 15:21:16
blscott

 - archive -- 

Akira

MITRE:  G1024

Akira is a ransomware variant and ransomware deployment entity active since at least March 2023. Akira uses compromised credentials to access single-factor external access mechanisms such as VPNs for initial access, then various publicly-available tools and techniques for lateral movement. Akira operations are associated with \"double extortion\" ransomware activity, where data is exfiltrated from victim environments prior to encryption, with threats to publish files if a ransom is not paid. Technical analysis of Akira ransomware indicates multiple overlaps with and similarities to Conti malware.


Akira is an advanced persistent threat (APT) that has been identified by security researchers in recent years. It is believed to be operated by Chinese hacking group APT10, which is responsible for a number of high-profile cyber attacks against government agencies and private companies around the world.

Akira is known for its stealthy nature, using advanced techniques such as malware droppers and backdoors to gain access to targeted systems without detection. It has been observed in various countries including Japan, China, India, Russia, South Korea, Germany, Italy, and the United States. Once inside a system, Akira can steal sensitive information or install additional tools for further exploitation.

The group behind Akira is believed to be highly skilled and well-funded, with access to advanced hacking techniques and resources that allow them to operate undetected for extended periods of time. As such, it pos

Techniques, tactics and practices:

Akira is an advanced persistent threat that employs a variety of techniques to gain access to targeted systems. Some of these include malware droppers, backdoors, and exploitation of vulnerabilities in software or operating systems. The group behind Akira also uses social engineering tactics such as phishing emails and watering hole attacks to trick users into downloading their malicious files.

Once inside a system, the attackers may use additional tools for further exploitation, including keyloggers, screen recorders, and remote access software. They are known to be highly skilled at evading detection by anti-virus programs and other security measures, using techniques such as obfuscating their code or hiding in plain sight within legitimate files.

Overall, Akira is a sophisticated threat that employs a wide range of tactics to gain access to sensitive information and carry out cyber attacks against government agencies and private



Comments
new comment
Nobody has commented yet. Will you be the first?


a.k.a
Howling Scorpius
PUNK SPIDER
GOLD SAHARA
G1024
 




This link is from a restricted area of the forums.
Forum



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.