Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
Akira Ransomware Targets Nutanix VMs with New Linux Encryptor
Advertisements

The Akira ransomware group has expanded its operations by developing a new Linux encryptor specifically designed to target Nutanix virtual machines. This development was identified by researchers at the cybersecurity firm Arctic Wolf, highlighting a significant shift in the group’s tactics to focus on enterprise-grade virtualization platforms.

Since its emergence in March 2023, the Akira ransomware operation has successfully extorted over $42 million from more than 250 victims. The group primarily targets small and medium-sized businesses across a range of industries, leveraging this new tool to compromise valuable virtual environments.

Targeting Virtualization Infrastructure

The Linux variant of the Akira ransomware is engineered to attack ESXi servers, which are commonly used in enterprise data centers. The encryptor is specifically configured to target Nutanix Prism, a centralized management solution for Nutanix’s virtualized infrastructure. By compromising Prism, the attackers can gain control over and encrypt the virtual machines managed by the platform.

Analysis of the malware shows it uses specific command-line arguments to execute its functions. These commands allow the attackers to define the encryption path, specify the percentage of a file to encrypt for speed, and point to network shares. Before initiating the encryption process, the ransomware is programmed to terminate running virtual machine processes to ensure the virtual disk files are accessible for encryption.

Operational Impact and Extortion

The deployment of this specialized Linux encryptor has enabled Akira to execute highly effective attacks against organizations using Nutanix virtualization solutions. The group’s success is quantified by the substantial ransoms collected since it began operations. The focus on virtual machines is a strategic decision, as these systems often contain critical business data and applications, increasing the pressure on victims to pay the ransom demand.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading