Important Security Advisory: Akira Ransomware
The NormCyber SOC Analysts are alerting customers to a new wave of ransomware attacks linked to suspected exploitation of SonicWall SSL VPN appliances (Gen 7).
The NormCyber SOC Analysts are alerting customers to a new wave of ransomware attacks linked to suspected exploitation of SonicWall SSL VPN appliances (Gen 7).
Organisations are advised to treat this as an active threat and maintain heightened vigilance until further notice.
Current intelligence suggests Akira operators may be exploiting a zero-day vulnerability to gain initial access, potentially bypassing standard controls, including multi-factor authentication (MFA). Notably, even fully patched devices have been compromised.
This represents a targeted, fast-moving campaign focused on remote access technologies. In many cases, ransomware is being deployed within hours of access being gained.
If your organisation uses SonicWall appliances (Gen 7 or otherwise), Norm recommends the following steps:
This campaign highlights the growing risk posed by internet-facing infrastructure particularly VPNs, firewalls, and edge devices, which are often outside the scope of endpoint detection and response (EDR) coverage.
If you’re unsure whether SonicWall appliances are in use within your organisation, or need help reviewing current configurations, please get in touch with us.
If you have any concerns or require a technical review, please email us directly at info@normcyber.com
Norm tracks and monitors the latest security trends and cyber threats and collates these into a fortnightly threat bulletin.
You can receive this bulletin for free, every fortnight, by entering your business email address below: