Akira ransomware has evolved with a new variant called 'Akira v2' written in Rust, which targets ESXi servers. Rust's executables are challenging to reverse-engineer due to deep in-lining and optimization, complicating analysis. Akira's control flow involves multi-threading and sophisticated file encryption using SOSEMANUK and

24m read timeFrom research.checkpoint.com
Post cover image
Table of contents
Executive SummaryIntroductionOverviewMain functionLock functionConclusionProtectionsIOCs
1 Comment

Sort: