Press ESC to close

Inside Akira Ransomware’s Rust Experiment

CategoryDetails
Threat ActorsAkira ransomware group, affiliates operating ransomware-as-a-service (RaaS) targeting ESXi servers.
Campaign OverviewEarly 2024 campaign experimenting with Akira v2, a Rust-based ransomware targeting ESXi servers. Analyzed for its control flow, design choices, and unique characteristics.
Target Regions/VictimsOrganizations using ESXi bare-metal hypervisor servers, Linux environments targeted as a secondary feature.
MethodologyMultithreaded design using Rust, command-line interface for operator control, in-depth use of Rust libraries like indicatif and seahorse for functionality and visual feedback.
Product TargetedESXi servers, Linux systems (with /vmfs/volumes as the default directory for targeting), general-purpose file encryption capabilities.
Malware ReferenceAkira ransomware v2, SOSEMANUK stream cipher, curve25519 cryptographic library for asymmetric encryption.
Tools UsedRust language features and libraries (indicatif, seahorse), compiled in Release mode, leveraging third-party crates for cryptography and control flow.
Vulnerabilities ExploitedNot directly exploiting vulnerabilities but instead focusing on file encryption and VM targeting using built-in tools like vim-cmd for ESXi VMs.
TTPsHybrid encryption with asymmetric and symmetric ciphers, use of Rust’s multithreading and CLI capabilities, in-depth analysis evasion through aggressive inlining of library functions.
AttributionAkira ransomware group and affiliates utilizing Rust for a cross-platform and efficient ransomware deployment.
Recommendations– Update and secure ESXi environments.
– Monitor for suspicious processes and CLI usage.
– Employ strong encryption for backups.
– Implement proactive defenses against RaaS attacks.
SourceCheck Point Research analysis of Akira ransomware, 2024.

Disclaimer: The above summary has been generated by an AI language model.

Source: Checkpoint

Published on: December 3, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *