bitcoin
bitcoin

$94082.534076 USD

0.61%

ethereum
ethereum

$3391.213654 USD

1.17%

tether
tether

$0.998416 USD

0.05%

xrp
xrp

$2.103883 USD

-1.17%

bnb
bnb

$708.534351 USD

2.05%

solana
solana

$193.885139 USD

1.15%

dogecoin
dogecoin

$0.319128 USD

1.27%

usd-coin
usd-coin

$0.999889 USD

-0.01%

cardano
cardano

$0.873229 USD

0.96%

tron
tron

$0.255258 USD

-1.32%

avalanche
avalanche

$36.792447 USD

2.03%

toncoin
toncoin

$5.627740 USD

-0.53%

chainlink
chainlink

$20.964913 USD

-0.46%

shiba-inu
shiba-inu

$0.000021 USD

-0.73%

sui
sui

$4.255559 USD

3.64%

Cryptocurrency News Articles

Akira Ransomware: A Global Cyber Scourge with Devastating Consequences

Apr 19, 2024 at 03:20 pm

The FBI and other international cybersecurity agencies warn of the Akira ransomware group, which has affected over 250 organizations and extorted $42 million since March 2023. Targeting Windows and Linux systems, Akira exploits pre-installed VPNs lacking MFA, extracts credentials, and locks systems. The attackers demand Bitcoin payments but withhold initial ransom demands, contacting victims directly.

Akira Ransomware: A Global Cyber Scourge with Devastating Consequences

Akira Ransomware: A Global Threat with Dire Implications

Washington, D.C. - A year-old ransomware group known as Akira has emerged as a formidable cyberthreat, targeting businesses and critical infrastructure entities worldwide. In a joint cybersecurity advisory, top global cybersecurity agencies, including the United States Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Europol's European Cybercrime Centre (EC3), and the Netherlands' National Cyber Security Centre (NCSC-NL), have issued a stark warning about the group's malicious activities.

Investigations conducted by the FBI have revealed that Akira ransomware has breached more than 250 organizations, extorting an estimated $42 million in ransom payments. Its targets have spanned North America, Europe, and Australia, with a wide range of industries and sectors falling victim to its malicious code. Initially targeting Windows systems, the FBI has also detected a Linux variant of Akira, expanding its reach even further.

The joint cybersecurity advisory provides a detailed analysis of Akira's tactics, techniques, and procedures (TTPs). The ransomware group gains initial access through pre-installed virtual private networks (VPNs) that lack multifactor authentication (MFA), a critical security measure that adds an extra layer of protection by requiring multiple forms of identification. Once inside the network, Akira proceeds to extract credentials and other sensitive information before locking up the system and displaying a ransom note.

Notably, Akira threat actors deviate from typical ransomware practices by not leaving an initial ransom demand or payment instructions on compromised networks. Instead, they wait for the victim organization to contact them, creating a sense of uncertainty and urgency. The ransomware group demands payments in Bitcoin (BTC), a decentralized digital currency that allows for anonymous transactions.

To protect against Akira ransomware and similar threats, the advisory recommends implementing a comprehensive set of cybersecurity best practices. These measures include:

  • Developing and regularly testing a recovery plan
  • Enabling MFA on all remote access systems
  • Filtering network traffic, including blocking unused ports and disabling hyperlinks
  • Encrypting data across the entire system
  • Regularly updating software and applying security patches

The advisory also highlights the importance of continually testing security programs in a production environment to ensure optimal performance against the latest cyber threats.

"The FBI, CISA, EC3, and NCSC-NL strongly encourage organizations to take these recommendations seriously and implement appropriate security measures to protect their systems and data," the advisory concludes.

The emergence of Akira ransomware is a stark reminder of the evolving sophistication and global reach of cybercrime. It underscores the need for organizations of all sizes to prioritize cybersecurity, adopt robust security measures, and remain vigilant against evolving threats.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Dec 31, 2024