Analysis of the New Akira Strain: How Digital Recovery’s Tracer Can Help

The cyber threat landscape in the United States is constantly evolving, and the Akira ransomware has emerged as one of the most destructive and persistent actors. Recently, U.S. government agencies, including the FBI, the CISA (Cybersecurity and Infrastructure Security Agency), and the HHS (Department of Health and Human Services), have issued joint advisories, highlighting the urgency and severity of the Akira group’s tactics .

Akira operates under the Ransomware-as-a-Service (RaaS) model and primarily targets medium and large organizations, with a focus on critical sectors. The complexity of its encryption and the sophistication of its tactics demand a specialized response, and it is in this scenario that Digital Recovery’s Tracer solution positions itself as a strategic advantage.

The Akira Ransomware in Detail: Tactics and Expansion

The Akira group emerged in March 2023 and quickly gained notoriety for its aggression and adaptability. There are indications that the group may have connections to the infamous, now-defunct Conti ransomware group, inheriting some of its experience and infrastructure.

Tactics, Techniques, and Procedures (TTPs)

Akira is not limited to a single attack vector but uses a combination of TTPs that make it particularly dangerous for corporate environments:

TacticDescriptionImplication for Recovery
Vulnerability ExploitationThe group actively exploits known vulnerabilities, such as the flaw in Cisco Adaptive Security Appliance (ASA) (CVE-2023-20269), to gain initial access to corporate networks.Initial access is fast and often undetectable by basic defenses.
Target ExpansionInitially focused on Windows systems, Akira has expanded its capabilities to include Linux environments, VMware, and more recently, Nutanix AHV VM disk files.Recovery requires specialized knowledge across multiple operating systems and virtualization environments.
Double ExtortionIn addition to encrypting data, Akira steals sensitive information before encryption, threatening to publish it if the ransom is not paid.Data recovery must be accompanied by a forensic analysis to mitigate the risk of data leakage.
Hybrid EncryptionThe ransomware uses a hybrid encryption scheme combining the ChaCha20 stream cipher to encrypt file content with the RSA public-key algorithm to protect the decryption keys.This makes decryption by brute force or generic tools virtually impossible.

The Challenge of Recovery and Government Alert

Given the complexity of Akira’s encryption, data recovery becomes a challenge that goes beyond the capabilities of internal IT departments or conventional recovery software.

The CISA and FBI have been emphatic in their recommendations, strongly advising organizations not to pay the ransom. Payment does not guarantee data recovery, does not prevent the leakage of stolen information, and, most importantly, funds future criminal activities.

It is at this point of crisis that the expertise of a specialized lab becomes indispensable.

The Specialized Solution: Digital Recovery’s Tracer

Digital Recovery, with its specialization in high-complexity cases and ransomware, has developed the Tracer solution, specifically designed to handle the most demanding encryptions, including those used by Akira.

Tracer is not a generic decryption tool; it is a proprietary methodology and technology that allows Digital Recovery to bypass the barriers imposed by hybrid encryption schemes like Akira’s ChaCha20/RSA.

Advantages of Tracer over Ransom Payment

Characteristic
Tracer Solution (Digital Recovery)
Ransom Payment
Security and Data LeakageRecovery is accompanied by a secure process, mitigating the risk of stolen data leakage.Payment does not prevent the leakage of stolen data (double extortion).
Ethics and LegalityDoes not fund cybercrime, in line with the recommendations of the CISA/FBI.Funds crime and may expose the company to legal sanctions.
DowntimeIn many cases, recovery can be performed remotely, drastically reducing downtime.The negotiation and key acquisition process can take days or weeks.

Next Steps After an Akira Attack

If your organization in the U.S. is a victim of the Akira ransomware, immediate action is crucial.

  1. Isolate the System: Immediately disconnect affected systems from the network to prevent spread.
  2. Do Not Attempt DIY Solutions: Do not attempt to restore corrupted backups or use generic recovery software, as this may permanently compromise the data.
  3. Contact Specialists: Digital Recovery is ready to initiate an advanced diagnosis immediately.

Do not waste time negotiating with criminals. Trust the Tracer technology and the expertise of Digital Recovery for safe and effective recovery.

Contact our team in the U.S. for an immediate diagnosis: Talk to our experts. 

We are always online

Please fill out the form, or select your preferred contact method. We will contact you to start recovering your files.

Latest insights from our experts

We can detect, contain, eradicate, and recover data after cyber attacks.

Post-incident