Best of 2025: New Akira Ransomware Decryptor Leans on Nvidia GPU Power
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是印尼的安全研究员Yohanes Nugroho开发了一个解密器,用于破解Akira勒索软件的加密。他用了Nvidia的GPU进行暴力破解,成功帮助一位受害者恢复了数据。这个解密器的关键在于利用文件的时间戳和GPU的并行计算能力,尽管过程复杂,但最终在GitHub上发布了工具,并且提到了成本和未来可能的改进空间。 接下来,我要把这些要点浓缩到100字以内。重点包括:研究员的身份、解密器的作用、使用GPU的方法、成功案例、技术细节(如时间戳和多线程加密)、成本以及发布平台。 可能会遗漏一些细节,比如Akira的发展历程和其他解密器的情况,但为了简洁,可以忽略这些次要信息。 最后,确保语言流畅自然,不使用“文章内容总结”之类的开头。 </think> 印尼安全研究员Yohanes Nugroho开发了一种利用Nvidia GPU暴力破解Akira勒索软件加密的方法,并成功帮助一名受害者恢复数据。该解密器基于文件时间戳和GPU并行计算能力,克服了复杂加密算法和多线程加密的挑战。尽管开发成本约1200美元且需优化改进,但已发布在GitHub上供免费使用。 2025-12-25 15:0:36 Author: securityboulevard.com(查看原文) 阅读量:6 收藏

A security researcher has given victims of the prolific Akira ransomware hope that they can recover their encrypted data without having to pay a ransom.

Yohanes Nugroho, a software programmer from Indonesia who writes the Tinyhack blog, said he found a way to brute-force the malware’s encryption using Nvidia GPUs that already has already proven successful with one of the ransomware’s victims.

In a highly detailed blog post, Nugroho runs through the three-week process of developing the decryptor, noting that his initial thought after a first look at the challenge was, “This should be easy – just brute-force it by looking at the file timestamps. How hard can it be?”

“It turned out to be more complicated than expected,” he added.

Such a decryptor is critical given the rising number of attacks by threat groups using the Akira ransomware-as-a-service (RaaS) and the massive amounts of ransom demanded. The ransomware emerged in early 2023 and, within four months, had claimed more than five dozen victims. By the middle of last year, the number of victims had grown to more than 250 and generated more than $42 million in ransom payments, according to CISA and the FBI.

It was also evolving quickly, initially coming out with a variant that targeted Windows systems but then developing a Linux variant targeting VMware ESXi virtual machines.

Avast in 2023 created a decryptor that addressed the Windows-focused variant that included a flaw the cybersecurity firm exploited, but it only worked on Windows systems and after it was published, the attackers updated their encryption to protect the malware against it.

A Complex Puzzle to Solve

Nugroho wrote that a friend brought the case of a company that had been attacked by the Linux-focused variant of Akira, and a first look showed that the ransomware uses the current time in nanoseconds as a seed, which made it possible to attack using brute-force methods. On his Linux machine, file modification times have nanosecond resolution. He was given a screenshot of a partial log that showed when the ransomware was executed, with millisecond resolution.

However, there were complicating factors. The variant he was dealing with has been active since late 2023, noting that the case he was looking at was from a company that was breached this year.

Encryption Methods a Challenge

The variant Nugroho addressed uses KCipher-2 and ChaCha8 encryption methods uses four distinct timestamps rather than one, and each of the four uses nanosecond resolution, with the first two and last two being related, making it impossible to brute force the time one by one. Each file ends up with a unique key, and key generation is complex, involving 1,500 rounds of SHA-256 encryption for each timestamp.

In addition, the malware uses multiple threads during execution, encrypting multiple files at the same time.

Adding to the challenge was that the VMware VMFS filesystem records only file modification times with precision in seconds and not all ESXi hosts have millisecond resolution in their log files. Some also have second-level precision.

He did catch a break: the malware’s code is written in C++, which he wrote is difficult to read. However, in this case, it wasn’t obfuscated.

The Power of GPUs

To break the encryption, Nugroho turned to GPUs. That work included leveraging ChatGPT to find ways to port the code to CUDA, Nvidia’s parallel computing platform for its GPUs. After some manual effort by the programmer, the code began to work. After that, the task was finding the right chips to use.

He initially used a Nvidia GeForce RTX 306090 GPU, but found it too slow, at best generating 60 million encryption tests a second. He upgraded RTX 3090, bumping up performance to about 1.5 billion encryptions per second, which meant testing 2 million offsets would require about 16 days on a single GPU or one day using 16 chips.

A jump to the RTX 4090 had the best results. The GPU is 60% more expensive than the RTX 3090, but faster, running 2 million offsets in seven days and – with 16 of the GPUs – dropping that to just more than 10 hours.

Nugroho suggested running the workloads in the cloud, pointing to RunPod or Vast AI as cost-effective options. He noted that performance likely can be improved by GPU experts who can optimize the code, adding that it’s probable that the Akira bad actors – as they did after Avast launched it decryptor – will eventually upgrade its code to close weaknesses that made his decryptor effective.

All told, he spent about $1,200 to develop the decryptor, which had made available on GitHub.

Recent Articles By Author


文章来源: https://securityboulevard.com/2025/12/new-akira-ransomware-decryptor-leans-on-nvidia-gpu-power-2/
如有侵权请联系:admin#unsafe.sh