Free decryptor released for the Akira ransomware

Free decryptor released for the Akira ransomware

Czech cybersecurity firm Avast released a free decryptor for the Akira ransomware to help victims to recover their data without paying a ransom.

Akira is a relatively new ransomware strain first spotted in March 2023. Before triggering Akira’s encryption process and posting a ransom demand, the operators behind the ransomware exfiltrate data from compromised machines. Then the hackers deploy Akira's payload.

The ransomware encrypts data, appends the “.akira” extension to the filenames of all affected files, and creates a ransom note. Upon execution, Akira runs a PowerShell command to delete Windows Shadow Volume Copies on the device.

The ransomware avoids certain folders, including Recycle Bin, System Volume Information, Boot, ProgramData, and Windows, as well as specific Windows system files with .exe, .lnk, .dll, .msi, and .sys extensions.

Last month, cybersecurity researchers spotted a Linux variant of the Akira ransomware targeting VMware ESXi virtual machines.

Back to the list

Latest Posts

Ulefone and Krüger&Matz smartphones found with dangerous preloaded app flaws

Ulefone and Krüger&Matz smartphones found with dangerous preloaded app flaws

The flaws allow attackers to steal PIN codes, perform unauthorized factory resets, and gain system-level access.
3 June 2025
New cryptojacking campaign exploits DevOps servers via misconfigurations

New cryptojacking campaign exploits DevOps servers via misconfigurations

The threat actors are compromising services like Docker, Gitea, and HashiCorp’s Consul and Nomad platforms.
3 June 2025
Google rolls out emergency Chrome update to patch actively exploited flaw

Google rolls out emergency Chrome update to patch actively exploited flaw

The flaw could allow attackers to corrupt memory on the heap via specially crafted HTML pages, potentially leading to remote code execution.
3 June 2025