Monday, April 28, 2025
HomeCyber Security NewsAkira Ransomware Expanded its Toolkit to Attack Linux Machines

Akira Ransomware Expanded its Toolkit to Attack Linux Machines

Published on

SIEM as a Service

Follow Us on Google News

A newly emerged ransomware known as Akira expands its operations to target Linux-based platforms which add the “.akira” file extension to each compromised file. 

Akira ransomware mostly operating since April 2023, and actively targeting numerous organizations, compromising their sensitive data. 

The Akira ransomware specifically targeted a wide range of industries during its attacks, encompassing sectors including Education, Banking, Financial Services and Insurance (BFSI), Manufacturing, Professional Services, and more. 

- Advertisement - Google News

The group has already compromised 46 publicly disclosed victims, most of whom are in the United States, according to Cyble report.

Technical Analysis of Akira Ransomware: 

The execution of the attack was achieved through the malicious 64-bit Linux executable Linkable Format (ELF) file. 

In order to execute the Akira executable, specific parameters need to be provided.  

The required parameters for running the Akira executable are as follows: 

  • “-p” / “–encryption_path” – Path of files/folder to be encrypted. 
  • “-s” / “–share_file” – Path of the shared network drive to be encrypted 
  • “-n” / “–encryption_percent” – Percentage of the files to be encrypted. 
  • “-fork” – Creating a child process for encryption.   

Upon execution, the Akira ransomware loads a pre-determined RSA public key to encrypt files in the system.

Once the public key is initialized, the Akira ransomware loads a list of predetermined file extensions it intends to target and encrypt. 

encrypt file
Figure: File Extensions Targeted by the Akira Ransomware 

The ransomware incorporates routines associated with multiple symmetric key algorithms, including AES, CAMELLIA, IDEA-CB, and DES. 

When encountering a file with an extension listed, the ransomware proceeds to encrypt the file and leave the ransomware note on the infectious machine. 

akira

The ransomware notes detailed how to reach the group to negotiate ransom and guidance to decrypt their data. 

Akira Ransomware, which was initially focused on Windows systems, has now expanded its target range to include Linux platforms.  

During attacks, Akira uses a combination of AES and RSA encryption to render the victim’s files inaccessible.  

In addition to encrypting the victim’s files, Akira will also remove the Shadow Volume copies of the files.  

This is done to prevent users from recovering their files using alternative methods.  

The proliferation of ransomware and shift in tactics reflects a growing trend among ransomware groups. 

Indicator of compromise: 

Indicators Indicator Type Description 
302f76897e4e5c8c98a52a38c4c98443 
9180ea8ba0cdfe0a769089977ed8396a68761b40 
1d3b5c650533d13c81e325972a912e3ff8776e36e18bca966dae50735f8ab296 
MD5 
SHA1 
SHA256 
Akira Ransomware 
ELF 
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...