Akira Ransomware encryption breached with cloud computing

Ccsp

Ransomware attacks have become one of the most feared cyber threats in recent times. Cybercriminals are increasingly leveraging sophisticated technologies, including artificial intelligence (AI), to execute highly effective and near-flawless attacks. The growing sophistication of these attacks makes them difficult to counter, leaving many victims with no option but to pay hefty ransoms to regain access to their data.

However, what if there was a way to break ransomware encryption using cloud computing? This might sound improbable, but a recent breakthrough has proven otherwise.

In a remarkable achievement, an Indonesian programmer successfully decrypted Akira ransomware encryption using cloud computing resources, offering a beacon of hope for future victims. This breakthrough demonstrates that paying a ransom may not always be the only solution to ransomware attacks in the future.

According to reports, Indonesian citizen Yohanes Nugroho was handed an encrypted file from Akira ransomware by a friend seeking assistance. In just 10 hours, Nugroho managed to decipher the encryption algorithm, setting a precedent for other ethical hackers to take on the challenge of breaking into the encryption schemes of notorious ransomware gangs.

As detailed in an update shared on Telegram, Nugroho leveraged the immense processing power of GPUs to crack the Akira ransomware’s encryption. He discovered that the malware developers used 1,500 permutations and combinations to scramble encryption keys before securing them with RSA-4096 encryption. However, by harnessing GPU capabilities, which can process 60 million permutations and combinations per second, he successfully overcame the encryption—a process he described as being as simple as making a cup of coffee once the right approach was in place.

To accomplish this, Nugroho used the GPU computing power provided by RunPod and later employed Vast.ai resources to complete the task within a short span of 10 hours. His work emphasizes the potential to further simplify the decryption process, making it more accessible with the development of automated computational tools.

Historically, law enforcement agencies worldwide have been engaged in similar efforts to develop ransomware decryption methods. However, cracking encryption keys has always been an arduous and time-consuming process. Now, thanks to the integration of AI-driven approaches and the availability of powerful GPU computing resources on demand, decrypting ransomware-encrypted files seems more feasible than ever.

This technological advancement could significantly reduce the downtime associated with ransomware attacks, helping organizations and individuals recover their data without succumbing to ransom demands. If further refined, such techniques could serve as a game-changer in the fight against cybercriminals, minimizing the devastating impact of ransomware attacks on businesses and critical infrastructures worldwide.

Ad


Join our LinkedIn group Information Security Community!


Source link