Sunday, May 07, 2023

Hackers Gone Wild Again! A sample of the Akira ransomware was discovered by MalwareHunterTeam ... Counter-Strike: Global Offensive (CS:GO) Map

Like other ransomware operations, Akira will breach a corporate network and spread laterally to other devices. Once the threat actors gain Windows domain admin credentials, they will deploy the ransomware throughout the network.

Meet Akira — A new ransomware operation targeting the enterprise

 
  • May 7, 2023
  •  
  • 09:16 AM
  •  
  • 0

Hand holding a key

The new Akira ransomware operation has slowly been building a list of victims as they breach corporate networks worldwide, encrypt files, and then demand million-dollar ransoms.

Launched in March 2023, Akira claims to have already conducted attacks on sixteen companies. These companies are in various industries, including education, finance, real estate, manufacturing, and consulting.

While another ransomware named Akira was released in 2017, it is not believed that these operations are related.

The Akira encryptor

A sample of the Akira ransomware was discovered by MalwareHunterTeam, who shared a sample with BleepingComputer so we could analyze it.

When executed, Akira will delete Windows Shadow Volume Copies on the device by running the following PowerShell command:

powershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"

The ransomware will then proceed to encrypt files that contain the following file extensions:

.accdb, .accde, .accdc, .accdt, .accdr, .adb, .accft, .adf, .ade, .arc, .adp, .alf, .ora, .btr, .ask, .cat, .bdf, .ckp, .cdb, .cpd, .cma, .dad, .dacpac, .daschema, .dadiagrams, .db-shm, .db-wal, .dbf, .dbc, .dbt, .dbs, .dbx, .dbv, .dct, .dcb, .ddl, .dcx, .dlis, .dsk, .dqy, .dtsx, .dsn, .eco, .dxl, .edb, .ecx, .exb, .epim, .fdb, .fcd, .fmp, .fic, .fmpsl, .fmp12, .fol, .fpt, .gdb, .frm, .gwi, .grdb, .his, .hdb, .idb, .itdb, .ihx, .jet, .itw, .kdb, .jtx, .kexic, .kexi, .lgc, .kexis, .maf, .lwx, .mar, .maq, .mav, .mas, .mdf, .mdb, .mrg, .mpd, .mwb, .mud, .ndf, .myd, .nrmlib, .nnt, .nsf, .nyf, .nwdb, .oqy, .odb, .owc, .orx, .pdb, .pan, .pnz, .pdm, .qvd, .qry, .rctd, .rbf, .rodx, .rod, .rsd, .rpd, .sbf, .sas7bdat, .sdb, .scx, .sdf, .sdc, .spq, .sis, .sqlite, .sql, .sqlitedb, .sqlite3, .temx, .tps, .tmd, .trm, .trc, .udl, .udb, .usr, .vpd, .vis, .wdb, .vvv, .wrk, .wmdb, .xld, .xdb, .abcddb, .xmlff, .abx, .abs, .adn, .accdw, .icg, .hjt, .kdb, .icr, .maw, .lut, .mdt, .mdn, .vhd, .vdi, .pvm, .vmdk, .vmsn, .vmem, .nvram, .vmsd, .raw, .vmx, .subvol, .qcow2, .vsv, .bin, .vmrs, .avhd, .avdx, .vhdx, .iso, .vmcx

While encrypting, the encryptor will skip files found in the Recycle Bin, System Volume Information, Boot, ProgramData, and Windows folders. It will also avoid encrypting the Windows system files with .exe, .lnk, .dll, .msi, and .sys file extensions.

When encrypting files, the ransomware encrypts files and appends the .akira extension will be appended to the file's name.

For example, a file named 1.doc would be encrypted and renamed to 1.doc.akira, as shown in the encrypted folder below.

Files encrypted by Akira
Files encrypted by Akira
Source: BleepingComputer

> Akira also uses the Windows Restart Manager API to close processes or shut down Windows services that may be keeping a file open and preventing encryption.

Each computer folder will contain a ransom note named akira_readme.txt  that includes information on what happened to a victim's files and links to the Akira data leak site and negotiation site.

"As for your data, if we fail to agree, we will try to sell personal information/trade secrets/databases/source codes - generally speaking, everything that has a value on the darkmarket - to multiple threat actors at ones. Then all of this will be published in our blog," threatens the Akira ransom note.

Akira ransom note
Akira ransom note
Source: BleepingComputer

Each victim has a unique negotiation password that is entered into the threat actor's Tor site. Unlike many other ransomware operations, this negotiation site just includes a chat system that the victim can use to negotiate with the ransomware gang.

Akira Tor payment site
Akira Tor payment site
Source: BleepingComputer

Data leak site used to extort victims

Like other ransomware operations, Akira will breach a corporate network and spread laterally to other devices. Once the threat actors gain Windows domain admin credentials, they will deploy the ransomware throughout the network.

However, before encrypting files, the threat actors will steal corporate data for leverage in their extortion attempts, warning victims that it will be publicly released if a ransom is not paid.

The Akira gang put a lot of effort into their data leak site, giving it a retro look where visitors can navigate it by typing in commands, as shown below.

Akira data leak site
Akira data leak site
Source: BleepingComputer

At the time of this writing, Akira has leaked the data for four victims on their data leak site, with the size of the leaked data ranging from 5.9 GB for one company to 259 GB for another.

From negotiations seen by BleepingComputer, the ransomware gang demands ransoms ranging from a $200,000 to millions of dollars.

They are also willing to lower ransom demands for companies who do not need a decryptor, and just want to prevent the leaking of stolen data.

The ransomware is currently being analyzed for weaknesses, and BleepingComputer does not advise victims to pay the ransom until its determined if a free decryptor can recover files for free.

Related Articles:

Ransomware gang hijacks university alert system to issue threats

Crown Resorts confirms ransom demand after GoAnywhere breach

New Dark Power ransomware claims 10 victims in its first month

The Week in Ransomware - March 24th 2023 - Clop overload

The Week in Ransomware - March 17th 2023 - Shifting to data extortion


As first reported by PC Gamer, a custom CS:GO map named 'de_voyna' resembles the ruins of a Slavic city featuring a secret underground bunker that players can visit to access information about the war in Ukraine.

New CS:GO map bypasses Russia's censorship of Ukraine war news

 
  • May 7, 2023
  •  
  • 10:16 AM
  •  
  • 0

CSGO map

Finish newspaper Helsinin Sanomat has created a custom

As first reported by PC Gamer, a custom CS:GO map named 'de_voyna' resembles the ruins of a Slavic city featuring a secret underground bunker that players can visit to access information about the war in Ukraine.explicitly made to bypass Russian news censorship and smuggle information about the war in Ukraine to Russian players.

Starting in March 2022, following its invasion of Ukraine, Russia began blocking international news outlets to implement tighter controls over what news reaches the Russian audience regarding the ongoing war.

CS:GO is one of the most popular first-person shooter games in the world, being the most played game on Steam. CS:GO is particularly enjoyed by Russian players, who reportedly constitute roughly one-tenth of the title's total player base.

It has also escaped the Russian censorship machine so far, allowing users from the country to log in to CS:GO servers and enjoy their matches without limitation.

As first reported by PC Gamer, a custom CS:GO map named 'de_voyna' resembles the ruins of a Slavic city featuring a secret underground bunker that players can visit to access information about the war in Ukraine.

"On the surface, it seems like a normal Slavic city. However, there might be something hidden underneath," reads the description of the game map.

'de_voyna' map (up) and secret bunker (down)
'de_voyna' map (up) and secret bunker (down) (3kliksphilip|YouTube)

The underground room features a selection of key data about the war in both English and Russian. 

This information includes Russian army death stats from reliable sources, details about missile strikes and other atrocities committed on civilians, images, and location of incidents.

Map of highlighted incidents
Map of highlighted incidents (3kliksphilip|YouTube)

"The purpose is to make Russians see that the terrors of war are happening in places that look very familiar to them," explains the newspaper on a dedicated page about the launch of the special CS:GO map.

The bunker is also accessible and made more apparent when the player dies on the 'de_voyna' map, as the secret room is highlighted during "fly view" mode and is hard to miss for those who don't know about its existence.

The map was released on May 3, 2023, coinciding with World Press Freedom Day, and it has just started gaining traction, with over 10,000 subscribers. But, unfortunately, the more popular it becomes, the higher the likelihood that Russian authorities will ban CS:GO.

Those interested in downloading 'de_voyna' on their CS:GO installation may do so either via the "Workshop Maps" section in-game or the Steam desktop or web application.

Getting 'de_voyna' from Steam
Getting 'de_voyna' from Steam

Helsinin Sanomat urges players from Western countries to play the map and try to get Russian players also to play it, which fulfills the primary purpose of its existence.

Last year, a similar project that aimed to "smuggle" information about the war in Ukraine to Russians used movie and game torrents to do it.

Named "Torrents of Truth," the initiative planted videos and text in pirated content archives that shared information on how to use VPNs to maintain anonymity from Russian ISPs and a list of reliable news sources.

Related Articles:

Russian hackers use WinRAR to wipe Ukraine state agency’s data

Hackers use fake ‘Windows Update’ guides to target Ukrainian govt

Ukrainian arrested for selling data of 300M people to Russians

Russia accuses NATO of launching 5,000 cyberattacks since 2022

STALKER 2 game developer hacked by Russian hacktivists, data stolen

ALEX KARP : "The Software-Defined War of the Future.' Unabashadly Pro-Western

 Karp saw a correlation. . .

posted  ago by Snoman +7 / -0

May 2, 2023, 2022 (EIRNS)—The high-tech company Palantir, founded by billionaire Peter Thiel with initial CIA funding, is making moves to expand its reach beyond domestic surveillance services for U.S. Immigration and Customs Enforcement. Thiel is not only a pioneer in the funding of the “legal” cannabis operation. The company has released a video demo of its latest offering, the Palantir Artificial Intelligence Platform (AIP), which is designed to integrate large language models (LLMs) like OpenAI’s GPT-4 and Google’s BERT into privately-operated networks.

In the video, says an April 27 article published by Metaverse Post, “Palantir showcased how its software could be used by the military in modern warfare scenarios. An operator could use a ChatGPT-style chatbot to order drone reconnaissance, generate attack plans, and coordinate the jamming of enemy communications.”  Therefore, “The launch of Palantir’s AIP is sure to raise questions about the ethical implications of Palantir’s involvement in military operations.”

(Already in February, Palantir CEO Alex Karp told CIA-affinity Washington Post columnist David Ignatius, in an interview, how Palantir’s AI capabilities had been provided to the Ukrainian military, implying—to Ignatius at least—that Palantir AI was “winning” the war for Ukraine.)

AIP generates “a secure digital record of the entire operation,” which the video claims is “crucial in mitigating significant legal, regulatory, and ethical risks in sensitive and classified settings,” and AIP has “industry-leading guardrails in place” to “prevent unauthorized actions, thus ensuring the safe use of the system.”

The military operator featured in the video demonstrates the practical application of Palantir’s scenario in “responding to a potential threat in Eastern Europe. By using AIP, the operator could efficiently and effectively gather more information about the enemy’s military equipment. With the help of the AIP’s large language models, the operator was also able to quickly ask questions and obtain accurate answers.”

Although the AIP’s abilities were showcased “effectively,” Palantir “recognizes the importance of governing the application of LLMs and algorithms in sensitive situations, particularly in military endeavors.” There are also concerns about the reliability and effectiveness of the technology, particularly about “preventing LLMs from generating false facts and details.”

It is quite probable that the call for a six-month moratorium of GPT applications, signed by many prominent figures in the AI industry, came as a response to Palantir’s announcement. Members of the U.S. Congress introduced a bill to prevent the use of artificial intelligence in making the decision as to whether to launch nuclear weapons.



Alex Karp's (CEO Palantir Technologies)vision on AI in the military domain | REAIM 2023




It's The Charlie Kirk Show Today! Arizona's got Talent

About the Show

Charlie Kirk is the next big thing in conservative talk radio and he's now hosting a daily radio show called "The Charlie Kirk Show" on the Salem Radio Network.

The radio show can be heard on great talk radio stations all over the country. He also airs a daily podcast of the same name, which has become one of the top 10 news shows on Apple New Podcast rankings.

About Charlie

Charlie Kirk is the Founder and President of Turning Point USA, a national student movement dedicated to identifying, organizing, and empowering young people to promote the principles of free markets and limited government.

 With a presence on over 2,000 high school and college campuses nationwide, 250,000 student members, and over 150 full-time staff, Turning Point USA is the largest and fastest growing conservative youth activist organization in the country. At just 26-years-old, Charlie has appeared on CNBC, Fox News and FOX Business News over 600 times, is an editor-at-large at Newsweek, and often writes columns for Fox News, The Hill, The Washington Times, Breitbart, and Daily Caller. 

He was named to the Forbes “30 under 30” list and was also the youngest speaker at the 2016 Republican National Convention and was the opening speaker at the 2020 RNC. He’s the author of three books including the #1 Amazon and New York Times bestseller, The MAGA Doctrine: The Only Ideas that Will Win the Future from Broadside Books, an imprint of Harper Collins. 

Charlie is also the chairman of Students for Trump, which aims to activate one million new college voters through its more than 350 chapters present on campuses in battleground states in the lead up to the 2020 presidential election. In 2019, Charlie was granted an honorary doctorate from Liberty University citing his exceptional leadership and energetic voice for conservatives. Later that year, Charlie co-founded The Falkirk Center for Faith and Liberty, a Christian think tank working to expand religious liberty and advance conservative principles in the public sphere. His social media reaches over 100 million people per month and according to Axios he is one of the “top 10 most engaged” Twitter handles in the world behind only President Trump among conservatives. Charlie is the host of “The Charlie Kirk Show” which is a top-10 ranked podcast on Apple News charts, and host of the all new nationally syndicated radio show which goes by the same name.

Check out Charlie's web site at charliekirk.com!

Tucker Carlson Is Angling to Launch Fox News Competitor, Has ‘Conversation’ With Elon Musk

Sunday, May 7, 2023

Former Fox News star Tucker Carlson is reportedly interested in either joining a competitor network or launching his own media empire, according to sources who spoke to Axios on Sunday.

“The idea that anyone is going to silence Tucker and prevent him from speaking to his audience is beyond preposterous,” Bryan Freedman, Carlson’s attorney, told Axios about the current ongoing contract dispute with the network.

Since being fired from the network on April 21, Tucker Carlson’s departure has resulted in plummeting ratings for Fox News among key demographic segments, along with continued anger from its viewers, The Blaze noted.

Axios reports that Carlson is planning to establish his own media empire, but his efforts may be hindered because his contract with Fox is not set to expire until January 2025.

Axios also reported that there have been conversations between Carlson and Elon Musk about potentially working together. Additionally, sources have indicated that Carlson is considering a direct-to-consumer model for delivering his content to viewers.

Carlson posted a roughly two-minute video on Twitter addressing viewers directly after Fox News announced they were benching him. The post, which was uploaded on April 26 at 8:01 ET, his former time slot, has since been viewed nearly 81 million times, with the video itself garnering more than 24 million views.

“One of the first things you realize when you step outside the noise for a few days is how many genuinely nice people there are in this country, kind and decent people, people who really care about what’s true and a bunch of hilarious people — also, a lot of those,” Carlson said in the video.

“The other thing you notice when you take a little time off is how unbelievably stupid most of the debates you see on television are, they’re completely irrelevant. They mean nothing. In five years, we won’t even remember that we had them, trust me as someone who’s participated,” he added.

“And yet at the same time, and this is the amazing thing, the undeniably big topics, the ones that will define our future, get virtually no discussion at all: war, civil liberties, emerging science, demographic change, corporate power, natural resources,” he noted further.

The accompanying text simply read “good evening,” which is the same phrase Carlson used to open his eponymously-named show on weeknights.

“[Carlson’s] team is preparing for war. He wants freedom,” a friend of Carlson reportedly told Axios.

“Now, we’re going from peacetime to Defcon1,” the friend also said, adding that Carlson at first wanted to get the job done “quiet and clean.” 

DHS denied claims that it would destroy evidence following the fatal shooting of Alex Jeffrey Pretti | Daily Beast

  Trump-Appointed Judge Blocks Cover-Up in VA Nurse Killing TAMPER-PROOF DHS denied claims that it would destroy evidence following the fata...