At Opransomware - Akira - Ransomware

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Co-Authored by: TLP:CLEAR Product ID: AA24-109A

April 18, 2024

#StopRansomware: Akira Ransomware


SUMMARY
Actions to take today to mitigate cyber
Note: This joint Cybersecurity Advisory (CSA) is part of threats from Akira ransomware:
an ongoing #StopRansomware effort to publish
• Prioritize remediating known exploited
advisories for network defenders that detail various
vulnerabilities.
ransomware variants and ransomware threat actors.
These #StopRansomware advisories include recently • Enable multifactor authentication (MFA)
and historically observed tactics, techniques, and for all services to the extent possible,
procedures (TTPs) and indicators of compromise (IOCs) particularly for webmail, VPN, and
to help organizations protect against ransomware. Visit accounts that access critical systems.
stopransomware.gov to see all #StopRansomware
• Regularly patch and update software and
advisories and to learn more about other ransomware
applications to their latest version and
threats and no-cost resources.
conduct regular vulnerability
The United States’ Federal Bureau of Investigation assessments.
(FBI), Cybersecurity and Infrastructure Security Agency
(CISA), Europol’s European Cybercrime Centre (EC3), and the Netherlands’ National Cyber Security
Centre (NCSC-NL) are releasing this joint CSA to disseminate known Akira ransomware IOCs and
TTPs identified through FBI investigations as recently as February 2024 and trusted third party
reporting.
Since March 2023, Akira ransomware has impacted a wide range of businesses and critical
infrastructure entities in North America, Europe, and Australia. In April 2023, following an initial focus
on Windows systems, Akira threat actors deployed a Linux variant targeting VMware ESXi virtual
machines. As of January 1, 2024, the ransomware group has impacted over 250 organizations and
claimed approximately $42 million USD in ransomware proceeds.
Early versions of the Akira ransomware variant were written in C++ and encrypted files with a .akira
extension; however, beginning in August 2023, some Akira attacks began deploying Megazord, using
Rust-based code which encrypts files with a .powerranges extension. Akira threat actors have
continued to use both Megazord and Akira, including Akira_v2 (identified by trusted third party
investigations) interchangeably.

To report suspicious or criminal activity related to information found in this joint Cybersecurity Advisory, contact your local FBI
field office or CISA’s 24/7 Operations Center at Report@cisa.gov or (888) 282-0870. When available, please include the
following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected;
type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.
This document is marked TLP:CLEAR. Recipients may share this information without restriction. Information is subject to
standard copyright rules. For more information on the Traffic Light Protocol, see cisa.gov/tlp.
TLP:CLEAR
TLP:CLEAR FBI | CISA | EC3 | NCSC-NL

The FBI, CISA, EC3, and NCSC-NL encourage organizations to implement the recommendations in
the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents.

TECHNICAL DETAILS
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 14. See MITRE
ATT&CK for Enterprise for all referenced tactics and techniques.

Initial Access
The FBI and cybersecurity researchers have observed Akira threat actors obtaining initial access to
organizations through a virtual private network (VPN) service without multifactor authentication (MFA)
configured[1], mostly using known Cisco vulnerabilities [T1190] CVE-2020-3259 and CVE-2023-
20269.[2],[3],[4] Additional methods of initial access include the use of external-facing services such
as Remote Desktop Protocol (RDP) [T1133], spear phishing [T1566.001][T1566.002], and the abuse
of valid credentials [T1078].[4]

Persistence and Discovery


Once initial access is obtained, Akira threat actors attempt to abuse the functions of domain
controllers by creating new domain accounts [T1136.002] to establish persistence. In some instances,
the FBI identified Akira threat actors creating an administrative account named itadm.
According to FBI and open source reporting, Akira threat actors leverage post-exploitation attack
techniques, such as Kerberoasting[5], to extract credentials stored in the process memory of the
Local Security Authority Subsystem Service (LSASS) [T1003.001].[6] Akira threat actors also use
credential scraping tools [T1003] like Mimikatz and LaZagne to aid in privilege escalation. Tools like
SoftPerfect and Advanced IP Scanner are often used for network device discovery (reconnaissance)
purposes [T1016] and net Windows commands are used to identify domain controllers [T1018] and
gather information on domain trust relationships [T1482].
See Table 1 for a descriptive listing of these tools.

Defense Evasion
Based on trusted third party investigations, Akira threat actors have been observed deploying two
distinct ransomware variants against different system architectures within the same compromise
event. This marks a shift from recently reported Akira affiliate activity. Akira threat actors were first
observed deploying the Windows-specific “Megazord” ransomware, with further analysis revealing
that a second payload was concurrently deployed in this attack (which was later identified as a novel
variant of the Akira ESXi encryptor, “Akira_v2”).
As Akira threat actors prepare for lateral movement, they commonly disable security software to avoid
detection. Cybersecurity researchers have observed Akira threat actors using PowerTool to exploit
the Zemana AntiMalware driver[4] and terminate antivirus-related processes [T1562.001].

Page 2 of 13 | Product ID: AA24-109A


TLP:CLEAR
TLP:CLEAR FBI | CISA | EC3 | NCSC-NL

Exfiltration and Impact


Akira threat actors leverage tools such as FileZilla, WinRAR [T1560.001], WinSCP, and RClone to
exfiltrate data [T1048]. To establish command and control channels, threat actors leverage readily
available tools like AnyDesk, MobaXterm, RustDesk, Ngrok, and Cloudflare Tunnel, enabling
exfiltration through various protocols such as File Transfer Protocol (FTP), Secure File Transfer
Protocol (SFTP), and cloud storage services like Mega [T1537] to connect to exfiltration servers.
Akira threat actors use a double-extortion model [T1657] and encrypt systems [T1486] after
exfiltrating data. The Akira ransom note provides each company with a unique code and instructions
to contact the threat actors via a .onion URL. Akira threat actors do not leave an initial ransom
demand or payment instructions on compromised networks, and do not relay this information until
contacted by the victim. Ransom payments are paid in Bitcoin to cryptocurrency wallet addresses
provided by the threat actors. To further apply pressure, Akira threat actors threaten to publish
exfiltrated data on the Tor network, and in some instances have called victimized companies,
according to FBI reporting.

Encryption
Akira threat actors utilize a sophisticated hybrid encryption scheme to lock data. This involves
combining a ChaCha20 stream cipher with an RSA public-key cryptosystem for speed and secure key
exchange [T1486]. This multilayered approach tailors encryption methods based on file type and size
and is capable of full or partial encryption. Encrypted files are appended with either a .akira or
.powerranges extension. To further inhibit system recovery, Akira’s encryptor (w.exe) utilizes
PowerShell commands to delete volume shadow copies (VSS) on Windows systems [T1490].
Additionally, a ransom note named fn.txt appears in both the root directory (C:) and each users’
home directory (C:\Users).
Trusted third party analysis identified that the Akira_v2 encryptor is an upgrade from its previous
version, which includes additional functionalities due to the language it’s written in (Rust). Previous
versions of the encryptor provided options to include arguments at runtime, which included:
• -p --encryption_path (targeted file/folder paths)
• -s --share_file (targeted network drive path)
• -n --encryption_percent (percentage of encryption)
• --fork (create a child process for encryption
The additional inclusion of threads allows the actor to have more granular control over the number of
CPU cores in use, increasing the speed and efficiency of the encryption process. The new version
also adds a layer of protection, utilizing the Build ID as a run condition, to hinder dynamic analysis.
The encryptor is unable to execute successfully without the specific unique Build ID. The ability to
deploy against only virtual machines using “vmonly” and the ability to stop running virtual machines
with “stopvm” functionalities have also been observed implemented for Akira_v2. After encryption, the
Linux ESXi variant may include the file extension “akiranew” or an added file named “akiranew.txt”
as a ransom note in directories where files were encrypted with the new nomenclature.

Page 3 of 13 | Product ID: AA24-109A


TLP:CLEAR
TLP:CLEAR FBI | CISA | EC3 | NCSC-NL

Leveraged Tools
Table 1 lists publicly available tools and applications Akira threat actors have used, including
legitimate tools repurposed for their operations. Use of these tools and applications should not be
attributed as malicious without analytical evidence to support threat actor use and/or control.
Table 1: Tools Leveraged by Akira Ransomware Actors

Name Description
AdFind AdFind.exe is used to query and retrieve information from Active Directory.
A network scanner is used to locate all the computers on a network and conduct a
Advanced IP
scan of their ports. The program shows all network devices, gives access to
Scanner
shared folders, and provides remote control of computers (via RDP and Radmin).
A common software that can be maliciously used by threat actors to obtain remote
AnyDesk access and maintain persistence [T1219]. AnyDesk also supports remote file
transfer.
LaZagne Allows users to recover stored passwords on Windows, Linux, and OSX systems.
PCHunter64 A tool used to acquire detailed process and system information [T1082].[7]
A cross-platform task automation solution made up of a command line shell, a
PowerShell scripting language, and a configuration management framework, which runs on
Windows, Linux, and macOS.
Mimikatz Allows users to view and save authentication credentials such as Kerberos tickets.
A reverse proxy tool [T1090] used to create a secure tunnel to servers behind
Ngrok
firewalls or local machines without a public IP address.
A command line program used to sync files with cloud storage services
RClone
[T1567.002] such as Mega.
A network scanner (netscan.exe) used to ping computers, scan ports, discover
shared folders, and retrieve information about network devices via Windows
SoftPerfect Management Instrumentation (WMI), Simple Network Management Protocol
(SNMP), HTTP, Secure Shell (SSH) and PowerShell. It also scans for remote
services, registry, files, and performance counters.
Used to split compromised data into segments and to compress [T1560.001] files
WinRAR
into .RAR format for exfiltration.
Windows Secure Copy is a free and open source SSH File Transfer Protocol, File
Transfer Protocol, WebDAV, Amazon S3, and secure copy protocol client. Akira
WinSCP
threat actors have used it to transfer data [T1048] from a compromised network to
actor-controlled accounts.

Page 4 of 13 | Product ID: AA24-109A


TLP:CLEAR
TLP:CLEAR FBI | CISA | EC3 | NCSC-NL

Indicators of Compromise
Disclaimer: Investigation or vetting of these indicators is recommended prior to taking action, such as
blocking.
Table 2: Malicious Files Affiliated with Akira Ransomware

File Name Hash (SHA-256) Description


d2fd0654710c27dcf37b6c1437880020
w.exe 824e161dd0bf28e3a133ed777242a0c Akira ransomware
a
dcfa2800754e5722acf94987bb03e814
Win.exe Akira ransomware encryptor
edcb9acebda37df6da1987bf48e5b05e
bc747e3bf7b6e02c09f3d18bdd0e64ee
AnyDesk.exe Remote desktop application
f62b940b2f16c9c72e647eec85cf0138
73170761d6776c0debacfbbc61b6988c DLL file that assists with the execution
Gcapi.dll
b8270a20174bf5c049768a264bb8ffaf of AnyDesk.exe
1b60097bf1ccb15a952e5bcc3522cf5c
Sysmon.exe 162da68c381a76abc2d5985659e4d38 Ngrok tool for persistence
6
Config.yml Varies by use Ngrok configuration file
aaa647327ba5b855bedea8e889b3fafd
Rclone.exe Exfiltration tool
c05a6ca75d1cfd98869432006d6fecc9
7d6959bb7a9482e1caa83b16ee01103
Winscp.rnd d982d47c70c72fdd03708e2b7f4c552c Network file transfer program
4
WinSCP-6.1.2- 36cc31f0ab65b745f25c7e785df9e72d1
Network file transfer program
Setup.exe c8919d35a1d7bd4ce8050c8c068b13c
3298d203c2acb68c474e5fdad8379181
890b4403d6491c523c13730129be3f7
5
Akira_v2 Akira_v2 ransomware
0ee1d284ed663073872012c7bde7fac
5ca1121403f1a5d2d5411317df282796
c
ffd9f58e5fe8502249c67cad0123ceeea
a6e9f69b4ec9f9e21511809849eb8fc
dfe6fddc67bdc93b9947430b966da287
Megazord 7fda094edf3e21e6f0ba98a84bc53198 Akira “Megazord” ransomware
131da83b521f610819141d5c740313c
e46578374abb22ef504a7593955a65f0
7

Page 5 of 13 | Product ID: AA24-109A


TLP:CLEAR
TLP:CLEAR FBI | CISA | EC3 | NCSC-NL

File Name Hash (SHA-256) Description


9f393516edf6b8e011df6ee991758480
c5b99a0efbfd68347786061f0e04426c
9585af44c3ff8fd921c713680b0c2b3bb
c9d56add848ed62164f7c9b9f23d065
2f629395fdfa11e713ea8bf11d40f6f240
acf2f5fcf9a2ac50b6f7fbc7521c83
7f731cc11f8e4d249142e99a44b9da7a
48505ce32c4ee4881041beeddb3760b
e
95477703e789e6182096a09bc98853e
0a70b680a4f19fa2bf86cbb9280e8ec5
a
0c0e0f9b09b80d87ebc88e2870907b6c
acb4cd7703584baf8f2be1fd9438696d
C9c94ac5e1991a7db42c7973e328fce
eb6f163d9f644031bdfd4123c7b3898b
0
aaa6041912a6ba3cf167ecdb90a434a
VeeamHax.exe 62feaf08639c59705847706b9f492015 Plaintext credential leaking tool
d
PowerShell script for obtaining and
Veeam-Get- 18051333e658c4816ff3576a2e9d97fe
decrypting accounts from Veeam
Creds.ps1 2a1196ac0ea5ed9ba386c46defafdb88
servers
PowershellKer 5e1e3bf6999126ae4aa52146280fdb91
Kerberos ticket dumping tool from LSA
beros 3912632e8bac4f54e98c58821a307d3
cache
TicketDumper 2
8317ff6416af8ab6eb35df3529689671a
sshd.exe OpenSSH Backdoor
700fdb61a5e6436f4d6ea8ee002d694
8317ff6416af8ab6eb35df3529689671a
sshd.exe OpenSSH Backdoor
700fdb61a5e6436f4d6ea8ee002d694
ipscan-3.9.1- 892405573aa34dfc49b37e4c35b6555 Network scanner that scans IP
setup.exe 43e88ec1c5e8ffb27ab8d1bbf90fc6ae0 addresses and ports
File Name Hash (MD5) Description
winrar-x64- 7a647af3c112ad805296a22b2a276e7
Network file transfer program
623.exe c

Page 6 of 13 | Product ID: AA24-109A


TLP:CLEAR
TLP:CLEAR FBI | CISA | EC3 | NCSC-NL

Table 3: Commands Affiliated with Akira Ransomware

Persistence and Discovery


nltest /dclist: [T1018]
nltest /DOMAIN_TRUSTS [T1482]
net group “Domain admins” /dom [T1069.002]
net localgroup “Administrators” /dom [T1069.001]
tasklist [T1057]
rundll32.exe c:\Windows\System32\comsvcs.dll, MiniDump ((Get-Process lsass).Id)
C:\windows\temp\lsass.dmp full [T1003.001]
Credential Access
cmd.exe /Q /c esentutl.exe /y
"C:\Users\<username>\AppData\Roaming\Mozilla\Firefox\Profiles\<firefox_profile_id>.default-
release\key4.db" /d
"C:\Users\<username>\AppData\Roaming\Mozilla\Firefox\Profiles\<firefox_profile_id>.default-
release\key4.db.tmp”
Note: Used for accessing Firefox data.
cmd.exe /Q /c esentutl.exe /y
"C:\Users\<username>\AppData\Local\Google\Chrome\User Data\Default\Login Data" /d
"C:\Users\<username>\AppData\Local\Google\Chrome\User Data\Default\Login Data.tmp”
Note: Used for accessing Google Chrome data.
Impact
powershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject" [T1490]

MITRE ATT&CK TACTICS AND TECHNIQUES


See Tables 4 -12 for all referenced Akira threat actor tactics and techniques for enterprise
environments in this advisory. For assistance with mapping malicious cyber activity to the MITRE
ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping
and CISA’s Decider Tool.
Table 4: Initial Access

Technique Title ID Use


Akira threat actors obtain and abuse
Valid Accounts T1078 credentials of existing accounts as a
means of gaining initial access.

Page 7 of 13 | Product ID: AA24-109A


TLP:CLEAR
TLP:CLEAR FBI | CISA | EC3 | NCSC-NL

Technique Title ID Use


Akira threat actors exploit
Exploit Public Facing Application T1190 vulnerabilities in internet-facing
systems to gain access to systems.
Akira threat actors have used remote
External Remote Services T1133 access services, such as RDP/VPN
connection to gain initial access.
Akira threat actors use phishing
Phishing: Spearphishing
T1566.001 emails with malicious attachments to
Attachment
gain access to networks.
Akira threat actors use phishing
Phishing: Spearphishing Link T1566.002 emails with malicious links to gain
access to networks.

Table 5: Credential Access

Technique Title ID Use


Akira threat actors use tools like
OS Credential Dumping T1003 Mimikatz and LaZagne to dump
credentials.
Akira threat actors attempt to access
OS Credential Dumping:
T1003.001 credential material stored in the
LSASS Memory
process memory of the LSASS.

Table 6: Discovery

Technique Title ID Use


Akira threat actors use tools to scan
System Network Configuration systems and identify services running
T1016
Discovery on remote hosts and local network
infrastructure.
Akira threat actors use tools like
System Information Discovery T1082 PCHunter64 to acquire detailed
process and system information.
Akira threat actors use the net
Domain Trust Discovery T1482 Windows command to enumerate
domain information.
Akira threat actors use the Tasklist
Process Discovery T1057 utility to obtain details on running
processes via PowerShell.

Page 8 of 13 | Product ID: AA24-109A


TLP:CLEAR
TLP:CLEAR FBI | CISA | EC3 | NCSC-NL

Technique Title ID Use


Akira threat actors use the net
Permission Groups Discovery:
T1069.001 localgroup /dom to find local system
Local Groups
groups and permission settings.
Akira threat actors use the net group
Permission Groups Discovery: /domain command to attempt to find
T1069.002
Domain Groups domain level groups and permission
settings.
Akira threat actors use nltest /
dclist to amass a listing of other
Remote System Discovery T1018
systems by IP address, hostname, or
other logical identifiers on a network.

Table 7: Persistence

Technique Title ID Use


Akira threat actors attempt to abuse
Create Account: Domain T1136.002 the functions of domain controllers by
Account creating new domain accounts to
establish persistence.

Table 8: Defense Evasion

Technique Title ID Use


Impair Defenses: Disable or Akira threat actors use BYOVD
T1562.001
Modify Tools attacks to disable antivirus software.

Table 9: Command and Control

Technique Title ID Use


Akira threat actors use legitimate
desktop support software like
Remote Access Software T1219
AnyDesk to obtain remote access to
victim systems.
Akira threat actors utilized Ngrok to
Proxy T1090 create a secure tunnel to servers that
aided in exfiltration of data.

Table 10: Collection

Technique Title ID Use


Archive Collected Data: Akira threat actors use tools like
T1560.001
Archive via Utility WinRAR to compress files.

Page 9 of 13 | Product ID: AA24-109A


TLP:CLEAR
TLP:CLEAR FBI | CISA | EC3 | NCSC-NL

Table 11: Exfiltration

Technique Title ID Use


Exfiltration Over Alternative Akira threat actors use file transfer
T1048
Protocol tools like WinSCP to transfer data.
Akira threat actors use tools like
CloudZilla to exfiltrate data to a cloud
Transfer Data to Cloud Account T1537
account and connect to exfil servers
they control.
Akira threat actors leveraged RClone
Exfiltration Over Web Service:
T1567.002 to sync files with cloud storage
Exfiltration to Cloud Storage
services to exfiltrate data.

Table 12: Impact

Technique Title ID Use


Date Encrypted for Impact T1486 Akira threat actors encrypt data on
target systems to interrupt availability
to system and network resources.
Inhibit System Recovery T1490 Akira threat actors delete volume
shadow copies on Windows systems.
Financial Theft T1657 Akira threat actors use a double-
extortion model for financial gain.

MITIGATIONS
Network Defenders
The FBI, CISA, EC3, and NCSC-NL recommend organizations apply the following mitigations to limit
potential adversarial use of common system and network discovery techniques, and to reduce the risk
of compromise by Akira ransomware. These mitigations align with the Cross-Sector Cybersecurity
Performance Goals (CPGs) developed by CISA and the National Institute of Standards and
Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and
NIST recommend all organizations implement. CISA and NIST based the CPGs on existing
cybersecurity frameworks and guidance to protect against the most common and impactful threats
and TTPs. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the
CPGs, including additional recommended baseline protections.
• Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary
data and servers in a physically separate, segmented, and secure location (e.g., hard drive,
storage device, the cloud) [CPG 2.F, 2.R, 2.S].
• Require all accounts with password logins (e.g., service accounts, admin accounts, and
domain admin accounts) to comply with NIST’s standards. In particular, require employees to

Page 10 of 13 | Product ID: AA24-109A


TLP:CLEAR
TLP:CLEAR FBI | CISA | EC3 | NCSC-NL

use long passwords and consider not requiring recurring password changes, as these can
weaken security [CPG 2.C].
• Require multifactor authentication for all services to the extent possible, particularly for
webmail, virtual private networks, and accounts that access critical systems [CPG 2.H].
• Keep all operating systems, software, and firmware up to date. Timely patching is one of
the most efficient and cost effective steps an organization can take to minimize its exposure to
cybersecurity threats. Prioritize patching known exploited vulnerabilities in internet-facing
systems. [CPG 1.E].
• Segment networks to prevent the spread of ransomware. Network segmentation can help
prevent the spread of ransomware by controlling traffic flows between—and access to—
various subnetworks and by restricting adversary lateral movement [CPG 2.F].
• Identify, detect, and investigate abnormal activity and potential traversal of the
indicated ransomware with a networking monitoring tool. To aid in detecting the
ransomware, implement a tool that logs and reports all network traffic, including lateral
movement activity on a network. Endpoint detection and response (EDR) tools are particularly
useful for detecting lateral connections as they have insight into common and uncommon
network connections for each host [CPG 3.A].
• Filter network traffic by preventing unknown or untrusted origins from accessing remote
services on internal systems. This prevents threat actors from directly connecting to remote
access services that they have established for persistence.
• Install, regularly update, and enable real time detection for antivirus software on all
hosts.
• Review domain controllers, servers, workstations, and active directories for new and/or
unrecognized accounts [CPG 1.A, 2.O].
• Audit user accounts with administrative privileges and configure access controls according
to the principle of least privilege [CPG 2.E].
• Disable unused ports [CPG 2.V].
• Consider adding an email banner to emails received from outside of your organization
[CPG 2.M].
• Disable hyperlinks in received emails.
• Implement time-based access for accounts set at the admin level and higher. For
example, the Just-in-Time (JIT) access method provisions privileged access when needed
and can support enforcement of the principle of least privilege (as well as the Zero Trust
model). This is a process where a network-wide policy is set in place to automatically disable
admin accounts at the Active Directory level when the account is not in direct need. Individual
users may submit their requests through an automated process that grants them access to a
specified system for a set timeframe when they need to support the completion of a certain
task.
• Disable command-line and scripting activities and permissions. Privilege escalation and
lateral movement often depend on software utilities running from the command line. If threat
actors are not able to run these tools, they will have difficulty escalating privileges and/or
moving laterally [CPG 2.E, 2.N].

Page 11 of 13 | Product ID: AA24-109A


TLP:CLEAR
TLP:CLEAR FBI | CISA | EC3 | NCSC-NL

• Maintain offline backups of data, and regularly maintain backup and restoration [CPG 2.R].
By instituting this practice, the organization helps ensure they will not be severely interrupted,
and/or only have irretrievable data.
• Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and
covers the entire organization’s data infrastructure [CPG 2.K, 2.L, 2.R].

VALIDATE SECURITY CONTROLS


In addition to applying mitigations, the FBI, CISA, EC3, and NCSC-NL recommend exercising, testing,
and validating your organization’s security program against the threat behaviors mapped to the
MITRE ATT&CK for Enterprise framework in this advisory. The FBI, CISA, EC3 and NCSC-NL
recommend testing your existing security controls inventory to assess how they perform against the
ATT&CK techniques described in this advisory.
To get started:
1. Select an ATT&CK technique described in this advisory (see Tables 4 -12).
2. Align your security technologies against the technique.
3. Test your technologies against the technique.
4. Analyze your detection and prevention technologies’ performance.
5. Repeat the process for all security technologies to obtain a set of comprehensive performance
data.
6. Tune your security program, including people, processes, and technologies, based on the
data generated by this process.
The FBI, CISA, EC3, and NCSC-NL recommend continually testing your security program, at scale, in
a production environment to ensure optimal performance against the MITRE ATT&CK techniques
identified in this advisory.

RESOURCES
• Stopransomware.gov is a whole-of-government approach that gives one central location for
ransomware resources and alerts.
• Resource to mitigate a ransomware attack: #StopRansomware Guide.
• No cost cyber hygiene services: Cyber Hygiene Services, Ransomware Readiness
Assessment.

REFERENCES
[1] Fortinet: Ransomware Roundup - Akira
[2] Cisco: Akira Ransomware Targeting VPNs without MFA
[3] Truesec: Indications of Akira Ransomware Group Actively Exploiting Cisco AnyConnect CVE-
2020-3259
[4] TrendMicro: Akira Ransomware Spotlight

Page 12 of 13 | Product ID: AA24-109A


TLP:CLEAR
TLP:CLEAR FBI | CISA | EC3 | NCSC-NL

[5] CrowdStrike: What is a Kerberoasting Attack?


[6] Sophos: Akira, again: The ransomware that keeps on taking
[7] Sophos: Akira Ransomware is “bringin’ 1988 back”

REPORTING
Your organization has no obligation to respond or provide information back to the FBI in response to
this joint CSA. If, after reviewing the information provided, your organization decides to provide
information to the FBI, reporting must be consistent with applicable state and federal laws.
The FBI is interested in any information that can be shared, to include boundary logs showing
communication to and from foreign IP addresses, a sample ransom note, communications with Akira
threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.
Additional details of interest include: a targeted company point of contact, status and scope of
infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial
attack vector, and host- and network-based indicators.
The FBI, CISA, EC3, and NCSC-NL do not encourage paying ransom as payment does not
guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to
target additional organizations, encourage other criminal actors to engage in the distribution of
ransomware, and/or fund illicit activities. Regardless of whether you or your organization have
decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to
the FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s
Incident Reporting System or its 24/7 Operations Center (report@cisa.gov or (888) 282-0870).

DISCLAIMER
The information in this report is being provided “as is” for informational purposes only. The FBI, CISA,
EC3, and NCSC-NL do not endorse any commercial entity, product, company, or service, including
any entities, products, or services linked within this document. Any reference to specific commercial
products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not
constitute or imply endorsement, recommendation, or favoring by the FBI or CISA.

ACKNOWLEDGEMENTS
Cisco and Sophos contributed to this advisory.

VERSION HISTORY
April 18, 2024: Initial version.

Page 13 of 13 | Product ID: AA24-109A


TLP:CLEAR

You might also like