Akira Ransomware Exploits Unpatched SonicWall VPNs
A resurgent Akira ransomware campaign is actively exploiting a year-old vulnerability in unpatched SonicWall SSL VPN appliances to gain initial network access. Attackers move laterally, harvest credentials using advanced techniques like "UnPAC the Hash," and exfiltrate data before deploying the ransomware. The attacks, which often target VMware ESXi environments, have been observed globally across multiple sectors. This activity coincides with a separate security incident where SonicWall firewall configuration backups were exposed, potentially providing threat actors with valid credentials. Security experts urge organizations to immediately patch vulnerable devices, reset all credentials, and enforce multi-factor authentication.
Latest mentioned: 10-13
Earliest mentioned: 10-10