A newly emerged ransomware known as Akira expands its operations to target Linux-based platforms which add the “.akira” file extension to each compromised file.
Akira ransomware mostly operating since April 2023, and actively targeting numerous organizations, compromising their sensitive data.
The Akira ransomware specifically targeted a wide range of industries during its attacks, encompassing sectors including Education, Banking, Financial Services and Insurance (BFSI), Manufacturing, Professional Services, and more.
The group has already compromised 46 publicly disclosed victims, most of whom are in the United States, according to Cyble report.
The execution of the attack was achieved through the malicious 64-bit Linux executable Linkable Format (ELF) file.
In order to execute the Akira executable, specific parameters need to be provided.
The required parameters for running the Akira executable are as follows:
Upon execution, the Akira ransomware loads a pre-determined RSA public key to encrypt files in the system.
Once the public key is initialized, the Akira ransomware loads a list of predetermined file extensions it intends to target and encrypt.
The ransomware incorporates routines associated with multiple symmetric key algorithms, including AES, CAMELLIA, IDEA-CB, and DES.
When encountering a file with an extension listed, the ransomware proceeds to encrypt the file and leave the ransomware note on the infectious machine.
The ransomware notes detailed how to reach the group to negotiate ransom and guidance to decrypt their data.
Akira Ransomware, which was initially focused on Windows systems, has now expanded its target range to include Linux platforms.
During attacks, Akira uses a combination of AES and RSA encryption to render the victim’s files inaccessible.
In addition to encrypting the victim’s files, Akira will also remove the Shadow Volume copies of the files.
This is done to prevent users from recovering their files using alternative methods.
The proliferation of ransomware and shift in tactics reflects a growing trend among ransomware groups.
Indicators | Indicator Type | Description |
302f76897e4e5c8c98a52a38c4c98443 9180ea8ba0cdfe0a769089977ed8396a68761b40 1d3b5c650533d13c81e325972a912e3ff8776e36e18bca966dae50735f8ab296 | MD5 SHA1 SHA256 | Akira Ransomware ELF |
A new project has exposed a critical attack vector that exploits protocol vulnerabilities to disrupt…
A threat actor known as #LongNight has reportedly put up for sale remote code execution…
Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager Mobile…
Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular application…
The European Union has escalated its response to Russia’s ongoing campaign of hybrid threats, announcing…
Venice.ai has rapidly emerged as a disruptive force in the AI landscape, positioning itself as…