New Akira lookalike ransomware campaign targets Windows users in South America


A new ransomware campaign is targeting Windows users in South America by imitating the Akira ransomware brand while relying on a different code base underneath. ESET Research said the threat actor uses a Babuk-based encryptor that adds the .akira extension and drops a ransom note that mimics Akira in both its Tor URLs and overall wording.

That matters because it can mislead victims and delay incident response. A company that sees Akira-style ransom notes may assume the attack came from the real Akira group, even though ESET says this operation only copies the branding and does not use Akira’s original encryptor.

The campaign appears focused on South America, where the operators likely hope to use a familiar ransomware name to pressure victims into paying faster. ESET’s public statement on X identified the threat as an “Akira lookalike ransomware campaign targeting South America.”

Why the campaign stands out

This campaign does not just borrow Akira’s name. It also copies the visual and operational cues that victims and researchers often use to identify a ransomware attack. ESET said the actor appends the .akira extension and uses a ransom note that mirrors Akira’s Tor references and core content.

The technical core is different. According to ESET’s finding, the encryptor is based on Babuk, a ransomware family whose leaked source code has enabled copycat and derivative threats for years. That reuse gives attackers a quicker path to building new strains without writing a fresh encryptor from scratch.

The result is a ransomware operation that looks familiar on the surface but points investigators in the wrong direction if they only check the ransom note and file extension. That makes careful malware analysis more important than ever in ransomware response.

What security teams should take from this

The biggest lesson is simple: do not attribute a ransomware attack based only on branding. File extensions, ransom note wording, and Tor portal references can all be faked. In this case, ESET says the actor borrowed Akira’s identity while using Babuk-based encryption logic underneath.

Defenders should also expect more copycat operations like this. ENISA’s Threat Landscape 2025 notes that Akira remained an active ransomware name in the broader ecosystem, which helps explain why criminals may want to imitate it for intimidation value.

Ransom note content mimicking Akira’s Tor URLs and overall message structure (Source – X)

For Windows environments, the practical advice remains the same. Keep systems patched, maintain offline backups, segment networks, and watch for unusual encryption activity or newly created .akira files. Even when the branding is fake, the business impact is real. This defensive guidance aligns with long-standing CISA ransomware recommendations on patching, segmentation, identity protection, and backup hygiene.

Key details at a glance

ItemDetails
Campaign typeAkira lookalike ransomware
Region named by researchersSouth America
Target platformWindows
Underlying encryptorBabuk-based
Fake branding usedAkira
Encrypted file extension.akira
Ransom note styleMimics Akira wording and Tor URLs
Research sourceESET Research

What organizations should do now

  • Verify ransomware attribution through technical analysis, not ransom note branding alone.
  • Hunt for fresh encryption events and sudden appearance of .akira extensions.
  • Check backup integrity and recovery speed before an incident happens.
  • Limit lateral movement with network segmentation.
  • Patch Windows systems and exposed services quickly.
  • Review endpoint detections for Babuk-like behavior and suspicious mass file modification.
  • Train users and administrators to report unusual file renames or ransom notes immediately.

FAQ

Is this the real Akira ransomware group?

Not based on ESET’s public finding. ESET said the campaign is an Akira lookalike and uses a Babuk-based encryptor rather than Akira’s original ransomware code.

Why would attackers copy Akira?

Akira is a recognizable ransomware name. By copying its branding, criminals can create confusion and add pressure on victims who already know the name or have seen coverage of past Akira attacks. This appears to be a brand impersonation tactic.

What should defenders watch for first?

Watch for unexpected file encryption, the .akira extension, suspicious ransom notes, and system behavior that matches known Babuk-style ransomware activity. Then confirm attribution through deeper analysis instead of assuming the note tells the whole story.

Does the South America focus matter?

Yes. It shows operators may be broadening their regional targeting or testing campaigns outside the markets that usually get the most ransomware attention. ESET explicitly said the campaign targets South America.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages