Cohesity REDLab has released updates to the threat library to detect emerging Akira related ransomware variants that are actively exploiting targets in the wild. Akira was first spotted last year, and this is an updated to the original detection. Users should closely monitor ant-ransomware backup anomalies in Security Center. Threat Scan feature should also be used in tandem to scan backup data using the default threat library or custom YARA rules. Users should also run periodic file-hash scans to detect dormant malware in backup data.
Akira and affiliates used compromised firewall appliances as an initial-access vector. After gaining access they deploy evasive “bring your own vulnerable driver” (BYOVD) techniques that load signed but vulnerable and legitimate drivers to defeat AV/EDR for data theft and rapid ransomware encryption.
Cohesity’s Anti-Ransomware and Threat Detection feature lets you scan backups snapshots and secondary stored data for anomalous behavior, known malware signatures, indicators of compromise (IOCs), using both built-in threat feeds and custom YARA rules. This helps ensure that the data recovered from backups is clean and avoids re-infecting production after a breach. It works by integrating curated threat intelligence and anomaly detection into Cohesity data protection platform so that customers can schedule or initiate threat scans over backups, inspect snapshots for malicious or suspicious artifacts, flag or quarantine compromised backups, and then use those evaluations to guide rapid recovery and response.
Start your 30-day free trial or view one of our demos.