Ako

Compare
Known RaaS

View crypto

Description

First observed in early January 2020 (initial victim post on January 9, 2020), Ako (also known as MedusaReborn) operates under a Ransomware-as-a-Service (RaaS) model, with daily beta builds reportedly offered for affiliates. It uses a double-extortion approach—encrypting files and exfiltrating data, with subsequent threats to leak the data via a dedicated leak site. Delivery primarily occurs via malspam, often through password-protected ZIP attachments containing malicious .scr executables. After compromise, it deletes shadow copies and disables recovery, then encrypts files—excluding certain extensions—and appends random six-character suffixes, dropping files like ako-readme.txt and id.key. Encryption is carried out using unspecified algorithms, but its behavior aligns closely with MedusaLocker variants. Known targets include networked Windows environments, potentially across multiple sectors. No notably high-profile or geographically specific incidents are detailed.

External Analysis4
External Analysis
https://digital.nhs.uk/cyber-alerts/2020/cc-3345
https://tripwire.com/state-of-security/ako-ransomware-using-spam-attachments-to-target-networks
https://attackiq.com/2025/01/09/emulating-ako-ransomware
https://sonicwall.com/blog/ako-ransomware-demands-3000-operators-hide-behind-tor
Ransom notes1
Urls1
Url
Status
Screen
Uptime 30d
Health
http://kwvhrdibgmmpkhkidrby4mccwqpds5za6uo2thcw5gz75qncv7rbhyad.onion Down
Chat servers1
Url
Status
Screen
Uptime 30d
Health
http://kwvhrdibgmmpkhkidrby4mccwqpds5za6uo2thcw5gz75qncv7rbhyad.onion/ Down
Note