Skip to main content

Ako ransomware could be the next threat to your network




  • Ako falls in the category of most modern ransomware as it does not remain confined to individual systems and spread through networks.
  • The ransomware places the ransom note entitled “ako-readme.txt” on the desktop.
As disclosed by the team of Bleeping computer, Ako ransomware was seen targeting the entire network rather than just individual workstations.
About Ako
The Ako ransomware was discovered after a victim posted about it on the forum. Bleeping Computer analyzed the malware and discovered that it was a new ransomware.
  • As per the victim, the ransomware affected the Windows 10 desktop and Windows SBS 2011 server.
  • Though the initial analysis by the researchers had hinted some similarities with MedusaLocker, the attackers said in an email that it was their own product.
In the email (to the Bleeping Computer team), the threat actor said “We see news about us. But that is wrong. About MedusaReborn. We have nothing to do with Medusa or anything else. This is our own product — Ako Ransomware, well, this is if you are of course interested.”
How does it work?
Ako works in quite a sophisticated manner.
  • Upon entering the system, the ransomware first deletes the shadow volume copies and recent backups.
  • It then disables the Windows recovery environment before beginning the data encryption.
A serious threat
  • While encrypting the files, it adds a randomly generated extension to the files. It also adds a CECAEFBE file marker to the encrypted files so that the ransomware can identify them.
  • During the encryption, it skips files with .exe, .sys, .dll, .ini, .key, .lnk, and .rdp extensions. It also excludes the files paths lacking $, AppData, Program Files, Program Files (x86), AppData, boot, PerfLogs, Tor Browser, Windows strings, ProgramData, Google, Intel, Microsoft, Application Data.
  • It then checks other connected machines on the network to complete the encryption process.
  • In the end, the ransomware places the ransom note entitled “ako-readme.txt” on the desktop.
  • Ako falls in the category of the modern ransomware as it does not remain confined to individual systems and spread through networks.
  • By infecting the entire network, it thus compels the victim firms to pay the ransom, which could cost them millions.
Closing lines
Hackers told the Bleeping Computer team that they also steal some data as part of their ‘job’.
As of now, it wasn’t clear what technique do the attackers use to distribute the malware. However, as per researchers, it was likely that attackers exploit Remote Desktop services for spreading the infection.

Originally published at https://cyware.com on January 13, 2020.

Comments

Popular posts from this blog

Lebanese Protesters Are Using This ‘Bridgefy’ Messaging App - What is it?

Bridgefy is an offline messaging app that lets you communicate with friends and family when you don't have access to the Internet, by simply turning on your Bluetooth antenna. Due to WhatsApp outage and the poor internet services, a new offline messaging app known as Bridgefy has started to gain traction among Lebanese protesters. The people are recommending using this app in case there is a shutdown of internet services. Did you know that: 1 billion people aren’t covered by 3G or 4G networks. 3.3 billion people live in areas where the mobile Internet can be accessed but remain without a mobile Internet subscription. 1 billion people own a smartphone but don’t own a data plan. 40% of the world population is forecast to remain unconnected by 2025. These numbers represent huge amounts of potential users that aren’t being reached by mobile apps. Bridgefy keeps your app working even when people do not have access to the Internet. T...

WhatsApp Users Exchanged Over 100 Billion Messages on New Year’s Eve, A New Record

WhatsApp is one of the most widely used communication apps on the planet and as such, clocks an insane number of messages and media exchanges on a daily basis. But the New Year's Eve broke a record that has been standing since WhatsApp's debut a decade ago. WhatsApp has revealed that users exchanged over 100 billion messages on New Year's eve. And out of that number, more than 20 billion messages were shared by Indian users alone. Moreover, around 12 billion out of the 100 billion+ messages shared on the platform were images. WhatsApp wrote in a press release that over 100 billion messages were shared globally on December 31 in the 24-hour duration leading up to the midnight of New Year's Eve. This is a record-breaking volume and is the highest number of messages exchanged in a single day ever since WhatsApp kicked off its services ten years ago. Out of those 100 billion+ messages shared on New Year's eve, WhatsApp says over 12 billion were images. Meanwhile...

Facebook updates iOS app to fix issues that let the camera open in the background

The issues were first reported this month This month, some users of Facebook’s iOS app  found that  that, in at least two situations, the app appeared to be activating the camera in the background without a user’s knowledge. Facebook said yesterday that it was submitting fixes for the issues to Apple, and the company tells us that, as of this morning, the updated app is now available for download on the App Store. I’ve downloaded the update to my iPhone 11 Pro, and I can’t get the camera to accidentally activate in either of the scenarios that were reported — but I also couldn’t get it to activate yesterday, so I can’t personally confirm that the issues are fixed. But if we take Facebook at its word that everything is resolved, it’s nice to see that the company acted quickly. Article reference:  https://www.theverge.com/2019/11/13/20963791/facebook-issue-fix-camera-open-background-update-ios-app-store