Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
NWHStealer Uses Bun Loader, Anti-VM Delivery Chain
May 8, 2026
Mozilla Patches Firefox 0-Days Using Claude Mythos
May 8, 2026
Critical Spring Vulnerabilities Expose Arbitrary Files and GCP Secrets
May 8, 2026
Home/Threats/Akira Lookalike Ransomware Targets Windows Users in South
Threats

Akira Lookalike Ransomware Targets Windows Users in South

A dangerous new ransomware campaign has emerged in South America, specifically targeting Windows users. This sophisticated strain closely mimics the notorious Akira ransomware. While the two may...

David kimber
David kimber
April 2, 2026 3 Min Read
3 0

A dangerous new ransomware campaign has emerged in South America, specifically targeting Windows users. This sophisticated strain closely mimics the notorious Akira ransomware.

While the two may appear nearly identical on the surface, this new threat is built on an entirely different foundation — one that quietly borrows from another notorious ransomware family to carry out its attacks.

The campaign has raised serious concern within the cybersecurity community because of how convincingly it mimics Akira.

Victims who fall prey to this threat find their files encrypted and their systems held hostage by a ransom note that looks almost identical to one from Akira — complete with matching Tor URLs and similar wording.

The deception is deliberate, designed to mislead victims and possibly even seasoned investigators into misidentifying the actual threat actor behind the attack.

ESET Research analysts identified this campaign after closely examining the ransomware’s behavior and inner workings, confirming that despite its Akira-like appearance, the encryptor powering the malware is actually Babuk-based.

#ESETresearch has identified an Akira lookalike ransomware campaign targeting South America. The threat actor is using a Babukbased encryptor that appends the .akira extension and drops a ransom note that mimics Akira both in Tor URLs and the overall content. 1/4

— ESET Research (@ESETresearch) April 2, 2026

This discovery was significant, as Babuk is a separate ransomware family whose source code was leaked publicly years ago and has since been repurposed by various threat actors.

ESET Research noted that the operator behind this campaign is using a Babuk-based encryptor that appends the .akira extension to encrypted files, while also dropping a ransom note that mirrors Akira both in its Tor URLs and overall content.

The regional targeting of South America marks a notable shift in ransomware geography. Historically, ransomware groups have focused heavily on North American and European organizations, where larger volumes of sensitive data and higher ransom payment rates make attacks more profitable.

This latest campaign suggests that threat actors are actively expanding their reach into South American markets, possibly using this lookalike strain as a testing ground before escalating to larger or more complex operations.

The timing also aligns with a broader global trend of ransomware impersonation. Cybercriminals have increasingly adopted the tactic of mimicking well-established ransomware brands to exploit the fear and brand recognition those names carry.

By disguising their tools under the Akira name, the operators of this campaign can capitalize on Akira’s established reputation without being directly affiliated with the original group.

Inside the Babuk-Based Encryptor

At the core of this campaign lies a Babuk-derived encryptor, which provides the malware with its actual file encryption capability.

Babuk’s source code was leaked publicly years ago, and since then it has been repeatedly recycled by various threat actors to create new ransomware variants with minimal development effort.

In this case, the operator took that leaked code and dressed it up to resemble Akira — adding the .akira file extension and crafting a ransom note that closely follows Akira’s known communication style, including dark web Tor-based links for victim negotiation.

What makes this encryptor particularly effective is how seamlessly the disguise holds together.

Ransom note content mimicking Akira's Tor URLs and overall message structure (Source - X)
Ransom note content mimicking Akira’s Tor URLs and overall message structure (Source – X)

The ransom note dropped on the victim’s system mirrors Akira’s formatting and language with enough accuracy to confuse both victims and security teams.

Victims are pointed toward Tor-based URLs that closely resemble those used by the real Akira group, making it easy for organizations to misattribute the attack and potentially delay a proper and timely response.

Organizations across South America and beyond should take immediate steps to reduce their exposure to this type of threat.

Keeping all Windows systems fully patched and updated is a basic but critical step. Network segmentation can help contain damage if ransomware reaches a system.

Maintaining regular offline backups ensures recovery without paying ransom. Security teams should monitor endpoints for unexpected .akira file extensions as an early warning sign.

It is also important to avoid attributing attacks solely based on ransom note content, as this campaign clearly demonstrates how effective and misleading ransomware impersonation tactics can truly be.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityExploitMalwarePatchransomwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Hackers Clone CERT-UA Site to Deploy Go-Based Trick Victims

Next Post

Elite SOCs Cut Escalation Rates with Better Tier Arming Threat

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ivanti EPMM 0-Day Vulnerability Actively Exploited Attacks
May 7, 2026
Critical Cisco Network Vulnerability Allows Remote DoS Attacks
May 7, 2026
CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us