Security researcher Yohanes Nugroho has released a free decryptor for the Linux variant of the Akira ransomware. The decryptor leverages GPU processing power to brute-force the encryption key, allowing victims to recover their files without paying the ransom.
Nugroho's work provides a glimmer of hope for organizations hit by this specific Akira variant. The researcher shared the decryptor and detailed the recovery process on their personal blog, tinyhack.com.
The decryptor is available on GitHub, offering a practical solution for victims of this particular Akira ransomware strain.
The Akira ransomware, like many others, encrypts files on compromised systems, demanding a ransom payment for the decryption key. This Linux variant targets ESXi servers. Nugroho encountered a recent version of the malware, active from late 2023 through early 2024.
The security researcher explained that this Akira variant uses a unique approach to key generation. It relies on four timestamps with nanosecond resolution as seeds for its encryption process. These timestamps are then fed into a complex algorithm involving 1,500 rounds of SHA-256 hashing for each timestamp, resulting in unique keys for each file.
The generated keys are saved at the end of each encrypted file, protected with RSA-4096 encryption and PKCS#11 padding. This makes decryption without the correct private key very difficult.
Nugroho's decryptor exploits the timestamp-based key generation to recover the keys. It works by generating potential keys based on timestamp ranges and comparing them to encrypted files.
Four timestamps used for generating keys (Source: tinyhack.com)
The researcher observed the following about the ransomware's key generation process:
It uses the current time (in nanoseconds) as a seed.
It relies on four distinct timestamps for each file's encryption key.
The key generation process involves 1,500 rounds of SHA-256 for each timestamp.
The initial analysis suggested that the timestamp from the system logs could be used to significantly narrow down the brute-force range.
However, Nugroho faced challenges including:
The need to test billions of timestamp combinations
VMware VMFS filesystem timestamps that lack nanosecond precision.
The ransomware uses multiple threads, complicating the encryption timing.
To overcome these challenges, Nugroho turned to GPU-based brute-forcing and reverse engineering the malware.
Nugroho initially tested the brute-forcing method using CPUs, but the performance was too slow. GPUs offered a significant speed boost for the computationally intensive task of generating and testing potential encryption keys. The researcher was able to achieve 1.5 billion encryptions per second on an RTX 3090.
Source: tinyhack.com
The speed allowed for practical brute-forcing of timestamp ranges. Nugroho used cloud GPU services like Runpod and Vast.ai to rent multiple GPUs for faster processing.
The decryption process involves the following steps:
Obtain Timestamps: Identify the file modification timestamps from the encrypted system.
Obtain Ciphertext and Plaintext: Extract ciphertext from the encrypted files. Obtaining plaintext requires some effort based on the file type.
Rent GPUs: Utilize cloud GPU services to perform the brute-force attack.
Run the Brute-Force: Execute the decryptor with the gathered information to find the correct keys.
Decrypt the Files: Once the keys are found, use the decryptor to unlock the files.
The researcher noted that the time offset between timestamps can vary. Measurements on the infected hardware revealed a normal range of 2-4 million nanoseconds, but the value can vary from 1.5 to 5 million.
Nugroho emphasizes that their decryptor is not a simple, generic tool. It requires technical expertise, and system administration skills. It also involves multiple steps and a good understanding of the specific Akira variant.
Nugroho stated that the code shared is filled with experimental logic and quick hacks and lacks proper testing.
Found this article interesting? Keep visit thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive tips like this.
You may also like these articles: Here are the 5 most contextually relevant blog posts:
Anthony Denis a Security News Reporter with a Bachelor's in Business Computer Application. Drawing from a decade of digital media marketing experience and two years of freelance writing, he brings technical expertise to cybersecurity journalism. His background in IT, content creation, and social media management enables him to deliver complex security topics with clarity and insight.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.