Akira
-
Blog
New Akira ransomware decryptor cracks encryptions keys using GPUs
Security researcher Yohanes Nugroho has released a decryptor for the Linux variant of Akira ransomware, which utilizes GPU power to retrieve the decryption key and unlock files for free. Nugroho developed the decryptor after being asked for help from a friend, deeming the encrypted system solvable within a week, based on how Akira generates encryption keys using timestamps. The project…
Read More » -
Blog
Ransomware group Akira exploits victims following IT provider breach – 60 and counting
After an attack on a yet-unknown IT provider, Akira has started extorting the victims of the breach. On Friday, Akira uploaded its first batch of 34 victims. Today, it’s uploaded another 26. Here’s what we know about the victims so far: Three attacks appear to be confirmed/connected to breaches from 2024 37 victims are from the United States, four are…
Read More » -
Blog
Akira and Fog ransomware now exploit critical Veeam RCE flaw
Ransomware gangs now exploit a critical security vulnerability that lets attackers gain remote code execution (RCE) on vulnerable Veeam Backup & Replication (VBR) servers. Code White security researcher Florian Hauser found that the security flaw, now tracked as CVE-2024-40711, is caused by a deserialization of untrusted data weakness that unauthenticated threat actors can exploit in low-complexity attacks. Veeam disclosed the…
Read More »