Akira ransomware can be cracked with 16 RTX 4090 GPUs in around ten hours — new counterattack breaks encryption
The freshest Akira variant uses old-timey encryption method vulnerable to brute-force methods

Another hold has been blown through the hull of the dreaded Akira ransomware attack: Blogger Tinyhack has discovered a new exploit to brute-force the virus's encryption — and has reportedly already used it to restore the data of an attacked company.
Akira is a well-known ransomware cyberattack, used by hackers in November to demand a $125k ransom in baguettes from a French company. It may now be escapable by affected companies thanks to a GPU-based brute-force counterattack. With an RTX 4090, the Tinyhack found they could crack the encrypted ransomware files in seven days, and with 16 GPUs, the process would take just over ten hours.
Akira-based ransomware attacks aimed at high-profile targets; it was first discovered in 2023 and known for ludicrously high ransom requests (sometimes reaching tens of millions of dollars). In 2023, Avast's Threat Research Team found the method Akira used to encrypt victim files, and published a free encryption breaker tool to free computers from the dreaded attack. Akira then patched this high-profile crack, adding some bespoke details to its originally publicly available encryption methods.
At least one Akira variant uses an encryption method that can be decrypted via the new GPU-based brute-force method over a period of days or weeks. The Akira attack uses the chacha8 and Kcipher2 encryption methods to generate per-file encryption keys, using four distinct timestamps, in nanoseconds, as seeds.
These timestamps can be deduced to a tight range of on average 5 million nanoseconds (0.005 seconds), and then precisely found with brute-force, a process requiring top-end GPUs such as Nvidia's RTX 3090 or 4090.
Several things must go right for those hoping to execute the decryption method. Encrypted files must be untouched following the encryption so the timestamp that the file was last accessed can be found and used for the brute-force, for example.
Using an NFS (as opposed to files just living on the network's local disks) can also complicate decryption, as server lag will make it more difficult to determine the true timestamps used by the encryption.
Stay On the Cutting Edge: Get the Tom's Hardware Newsletter
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.
Using an RTX 4090, decrypting a single file by running through every possible nanosecond in the average range of 4.5 million nanoseconds, finding the correct four timestamps, and generating the appropriate decryption keys takes around 7 days. Affected organizations are recommended to rent servers through services like runpod or vast.ai, using multiple GPU servers to bring the time down.
Tinyhack's client took around 3 weeks to successfully decrypt a full set of VM files.
Ransomware attacks are most often impossible to decrypt without paying ransom, so finding a method to circumvent the attack is a big win for cybersecurity research. While those behind Akira will likely quickly patch this method for future attacks as they did after the Avast decryption release, those already hit by Akira may be able to free infected systems with this method.
Tinyhack's blog post runs through the entire process of discovering the vulnerability and full instructions to decrypt with it, so please head there to get an exhaustive look at brute-forcing a way into Akira. Ransomware has come a long way since its beginnings on a floppy disk sent by mail, and today marks another victory against it.

Dallin Grimm is a contributing writer for Tom's Hardware. He has been building and breaking computers since 2017, serving as the resident youngster at Tom's. From APUs to RGB, Dallin has a handle on all the latest tech news.
-
Heat_Fan89 Welcome to the Digital World from hell. Can't wait for all the shenanigans when Banks make the switch to digital currencies. That ought to be fun.Reply -
FunSurfer So now ransomware attackers can make more money by running a renting service of servers for ransomware decryption...Reply
Why can't the OS detect the chacha8 and Kcipher2 encryption methods running at real time? It's about time to put the AI Copilot for a good use... -
A Stoner I have a question about cracking encryption... If you already know what is inside the file, shouldn't that make it much easier to crack encryption? Say you know that there is an exact file this large that looks exactly like this, should that not inform the encryption cracking?Reply -
DingusDog
That's not how it works, that's not how any of this works. But at least username checks out.A Stoner said:I have a question about cracking encryption... If you already know what is inside the file, shouldn't that make it much easier to crack encryption? Say you know that there is an exact file this large that looks exactly like this, should that not inform the encryption cracking? -
NightKnight1337
Does knowing what's inside a house make it easier for you to go through the door?A Stoner said:I have a question about cracking encryption... If you already know what is inside the file, shouldn't that make it much easier to crack encryption? Say you know that there is an exact file this large that looks exactly like this, should that not inform the encryption cracking?
It's all about the lock -
USAFRet If you're at the point of having to use a 4090 to (attempt to) decrypt your data, you've already lost the battle.Reply -
edzieba
Currencies have been digital for over half a century when SWIFT replaced TELEXed transfer orders. Did you think COBOL was just invented for fun?Heat_Fan89 said:Can't wait for all the shenanigans when Banks make the switch to digital currencies. That ought to be fun.
Currencies have been digital for a long, long time, and they were ephemeral long before even that (when currencies ceased to be asset-backed and transitioned to economy-backed AKA 'fiat'), and large fund transfers (e.g. wire transfers) were so even before that.
Use of a distributed ledger rather than a centralised ledger isn't even a major distinction, as there are plenty of distributed ledger systems already in active use for inter-bank payments (e.g. Spunta Banka DLT). -
A Stoner
It was how people were able to hack into encrypted PDFs in the past as I recall. If they could provide accurate information to the cracker as to what was inside, "exact quotes" from it, it gave them the ability to crack it faster, since they had something to compare the data to to validate keys.DingusDog said:That's not how it works, that's not how any of this works. But at least username checks out. -
stronk2211 Author is missing 6 zeros from his nanoseconds. A nanosecond is 0.000000001 seconds.Reply -
Silicon Mage If you store your data in the Cloud using something like Dropbox it maintains a Version history and you can get your stuff back without any problems at all.Reply
So if you get ransomwared all you have to do is reinstall your OS.