Get our free app for a better experience

4.9
Install Now

National Affairs

National Affairs

AKIRA ransomware

30 Jul 2023 Zinkpot 170
  1. Recently, a dangerous Internet ransomware virus called Akira has been making headlines as the Indian Computer Emergency Response Team (CERT-In) is warning against its malicious activities in cyberspace i.e. stealing personal information and encrypting data leading to the extortion of money from people.
  2. ransomware is a form of malignant software that infects and blocks users from accessing their data and systems until they pay a ransom to the attackers.
  3. The primary objective of Akira Ransomware is to steal vital personal information from its victims. This sensitive data can include financial records, personal identification details, and confidential documents.
  4. It is not limited to a specific operating system. It targets both Windows and Linux-based systems, making it a potential threat to a wide range of users.
  5. One of the most frightening aspects of this ransomware is its utilization of double extortion tactics. The Ransomware Group first encrypts the victim’s data, rendering it inaccessible, and then they threaten to release the stolen data on the dark web, if the victim does not pay the ransom.
  6. The Virtual Private Network (VPN) services are likely to be the alleged sources through which ransomware groups access the victims’ environment particularly where users have not enabled multi-factor authentication.
  7. According to the cyber agency, this Ransomware Group has also utilized tools such as AnyDesk, WinRAR, and PCHunter during intrusions These tools are often found in the victim’s environment, and their misuse typically goes unnoticed.
  8. It encrypts files found in various hard drive folders, excluding the ProgramData, Recycle Bin, Boot, System Volume Information, and Windows folders.
  9. The cyber advisory recommends the Internet users to use basic online hygiene and protection protocols to keep safe from such virus attacks. It also advises that operating systems and applications should be updated regularly, and virtual patching can be considered for protecting legacy systems and networks.
  10. People are advised to keep an offline backup of data and update it in a timely manner, and use strong passwords and enhanced security features such as two-factor authentication. One should also stay cautious while accessing data from external USB drives.
     

About author

zinkpot

Zinkpot

Ask Anything, Know Better

ASK YOUR QUESTION
अपना प्रश्न पूछें
VIEW MORE
Join Whatsapp Group