APP Users: If unable to download, please re-install our APP.
Only logged in User can create notes
Only logged in User can create notes

General Studies 3 >> Science & Technology

audio may take few seconds to load

AKIRA RANSOMEWARE

AKIRA RANSOMWARE

 

1. Context

The Computer Emergency Response Team of India issued an alert for the ransomware dubbed “Akira.” The ransomware, found to target both Windows and Linux devices, steals and encrypts data, forcing victims to pay double ransom for decryption and recovery.

2. Akira Ransomware

  • The Akira ransomware is designed to encrypt data, create a ransomware note and delete Windows Shadow Volume copies on affected devices.
  • The ransomware gets its name due to its ability to modify filenames of all encrypted files by appending them with the “.akira” extension.
  • In recent times, the Akira ransomware has emerged as a serious cyber threat, targeting corporate networks across various domains, including education, finance, real estate, manufacturing, and consulting.
  • This ransomware is specifically designed to encrypt data, leaving victims helpless unless they pay a ransom to the attackers. 
  • Using VPN services, it tricks users into downloading malicious files. After infecting a device, it steals sensitive data and extorts victims for a ransom.
  • Organizations should maintain offline backups, update systems regularly, use strong passwords, and implement multi-factor authentication to protect against Akira ransomware.
Image Source: The Hindu
3. How Akira Ransomware Works:

Akira ransomware employs various techniques to infiltrate and compromise devices:

  • Infection Methods: The primary method of infection is through spear-phishing emails that contain malicious attachments in the form of archived content (zip/rar) files. Additionally, the ransomware may spread via drive-by downloads, which inadvertently download malicious code onto the victim's device, or through specially crafted web links in emails that lead to the download of malicious code. It has also been observed to exploit insecure Remote Desktop connections.
  • Encryption and Deletion: Once the ransomware infects a device, it proceeds to encrypt the victim's data, appending the ".akira" extension to all encrypted files. The malware is also designed to delete Windows Shadow Volume copies, rendering recovery through traditional means nearly impossible.
  • Service Termination: Akira ransomware terminates active Windows services using the Windows Restart Manager API to prevent interference with the encryption process.
  • Targeted Encryption: To maintain system stability, the ransomware avoids encrypting certain critical folders like Program Data, Recycle Bin, Boot, System Volume Information, and key Windows system files with specific extensions (e.g., .syn, .msl, and .exe).
  • Extortion and Communication: Once the data is encrypted, the ransomware leaves behind a note named "akira_readme.txt," containing information about the attack and a link to the Akira gang's negotiation site on the dark web. Victims are given unique negotiation passwords to communicate with the attackers via a chat system on the site.
4. Protecting Against Akira Ransomware:

To safeguard against Akira ransomware and other similar threats, users, and organizations can implement the following security measures:

  • Maintain Offline Backups: Regularly back up critical data to offline storage to ensure data recovery in case of a ransomware attack.
  • Keep Systems Updated: Ensure that operating systems and networks are regularly updated with the latest patches and security fixes. For legacy systems, consider using virtual patching.
  • Implement Email Security: Enforce Domain-based Message Authentication, Reporting, and Conformance (DMARC), DomainKeys Identified Mail (DKIM), and Sender Policy Framework (SPF) to prevent email spoofing and spam.
  • Use Strong Passwords and MFA: Enforce strong password policies and implement multi-factor authentication (MFA) to add an extra layer of security to user accounts.
  • Restrict External Devices: Adopt a strict external device usage policy to prevent unauthorized access and potential malware introduction.
  • Encrypt Data in Transit and at Rest: Implement data-at-rest and data-in-transit encryption to protect sensitive information from unauthorized access.
  • Block Potentially Malicious Attachments: Configure email systems to block attachment file types that are commonly associated with malware (e.g., .exe, .pif, .url).
  • Conduct Regular Security Audits: Perform periodic security audits of critical networks and systems, especially database servers, to identify vulnerabilities and weaknesses.

5. Computer Emergency Response Team (CERT)

  • Computer Emergency Response Team (CERT) is a specialized group of experts responsible for providing rapid response and support during cyber security incidents.
  • CERTs play a crucial role in detecting, analyzing, and mitigating cyber threats and vulnerabilities.
  • These teams are often established within organizations, government agencies, or independent entities, and their primary objective is to enhance overall cybersecurity readiness and incident response capabilities.

6. Key Functions of CERT :

  • Incident Handling and Response: CERTs are equipped to handle various cybersecurity incidents, such as malware infections, data breaches, ransomware attacks, and denial-of-service (DoS) attacks. They investigate the incidents, assess the impact, and take necessary actions to contain and mitigate the threat.
  • Threat Intelligence and Analysis: CERTs continuously monitor and analyze emerging cyber threats, vulnerabilities, and attack patterns. They collect threat intelligence to better understand the evolving threat landscape and develop proactive defense strategies.
  • Information Sharing: CERTs facilitate the sharing of cybersecurity information and best practices among stakeholders, including other CERT teams, organizations, government agencies, and private sectors. This collaboration helps in improving the collective defense against cyber threats.
  • Vulnerability Management: CERTs assist in identifying and addressing vulnerabilities in software, systems, and networks. They work closely with vendors and developers to coordinate the responsible disclosure and timely patching of security flaws.
  • Cybersecurity Awareness and Training: CERTs promote cybersecurity awareness among employees, users, and the general public. They conduct training sessions and awareness campaigns to educate individuals about safe online practices and potential threats.
  • Proactive Measures: CERTs conduct risk assessments, penetration testing, and security audits to proactively identify weaknesses in an organization's security posture. They recommend and implement measures to strengthen overall cybersecurity resilience.
  • Incident Coordination: In the case of large-scale cyber incidents that affect multiple organizations or sectors, CERTs play a critical role in coordinating response efforts, ensuring effective communication, and facilitating collaboration among relevant parties.
  • CERTs operate based on established frameworks and guidelines, such as those defined by the Forum of Incident Response and Security Teams (FIRST) and the United States Computer Emergency Readiness Team (US-CERT).
  • They often collaborate with law enforcement agencies, regulatory bodies, and international cybersecurity organizations to address global cyber threats.
For Prelims: Akira Ransomware, Forum of Incident Response and Security Teams (FIRST), the United States Computer Emergency Readiness Team (US-CERT), Multi-factor authentication (MFA), Domain-based Message Authentication, Reporting, and Conformance (DMARC), DomainKeys Identified Mail (DKIM), and Sender Policy Framework (SPF)
For Mains: 1. Examine the spread and impact of Akira ransomware on corporate networks across various domains. Discuss the methods employed by the attackers to infect devices, especially focusing on the role of spear-phishing emails, drive-by downloads, and insecure Remote Desktop connections. (250 words).
 
Previous year Questions
1. The terms 'WannaCry, Petya, and EternalBlue' sometimes mentioned in the news recently are related to (UPSC 2018)
A. Exoplanets
B. Cryptocurrency
C. Cyberattacks
D. Mini satellites
Answer: C
 Source: The Hindu

Share to Social