Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Akira Hits SonicWall VPNs in Zero‑Day

August 4, 2025
Reading Time: 3 mins read
in Alerts
Fake OAuth Apps Breach Microsoft 365

In late July 2025, a significant surge in cyberattacks attributed to the Akira ransomware group was observed, with a clear focus on compromising corporate networks through SonicWall Secure Sockets Layer (SSL) Virtual Private Network (VPN) appliances. According to a report from Arctic Wolf Labs, this new campaign involves rapid intrusions following initial VPN access. The cybersecurity firm noted that the uptick in malicious activity involving these specific devices was first registered around July 15, 2025, though evidence suggests that similar tactics targeting SonicWall VPNs may have been employed by threat actors as far back as October 2024.

The methodology of the attacks points towards a sophisticated and swift operation.

Researchers highlighted a notably short interval between the moment an attacker gained initial access to a network via an SSL VPN account and the subsequent deployment of ransomware to encrypt files. A key indicator of malicious activity, as opposed to legitimate use, is the origin of the VPN connections. While typical employees log in from networks provided by common broadband internet service providers, these intrusions were observed originating from Virtual Private Server (VPS) hosting environments, a common tactic used by ransomware groups to obscure their location and activities.

The most critical concern arising from these incidents is the strong possibility that Akira is exploiting a previously unknown, or “zero-day,” vulnerability in the SonicWall products.

This suspicion is fueled by evidence that some of the compromised organizations were running fully-patched SonicWall devices, which should theoretically be protected against known exploits. While a zero-day exploit is the leading theory, experts have not yet dismissed the possibility that attackers gained access through credential-based methods, such as using stolen or weak passwords. At the time of the report, SonicWall had not yet issued a response or provided further details on the matter.

In response to this active threat, security professionals have issued urgent recommendations for organizations utilizing the affected technology. The primary mitigation strategy, given the potential for a zero-day exploit, is to disable the SonicWall SSL VPN service entirely until an official patch is developed and deployed. Beyond this immediate step, organizations are strongly advised to implement or reinforce standard cybersecurity best practices, including enforcing multi-factor authentication (MFA) on all remote access accounts, deleting any unused or inactive user accounts on the firewall, and adhering to strict password hygiene policies.

The Akira ransomware gang, which first appeared in March 2023, has rapidly grown into a formidable threat in the cybercrime landscape. By early 2024, the group was estimated to have extorted approximately $42 million from over 250 victim organizations. Recent statistics from Check Point for the second quarter of 2025 positioned Akira as the second most active ransomware group, just behind Qilin, having claimed 143 victims in that period. The group also demonstrates a notable geographic preference, with 10% of its victims being Italian companies, a significantly higher proportion compared to the general ransomware ecosystem.

Reference:

  • Akira Ransomware Exploits SonicWall VPNs in Suspected Zero‑Day Attack on Fully‑Patched Devices
Tags: August 2025Cyber AlertsCyber Alerts 2025CyberattackCybersecurity
ADVERTISEMENT

Related Posts

Smishing targets routers in Belgium 2025

Smishing targets routers in Belgium 2025

October 2, 2025
Smishing targets routers in Belgium 2025

Outlook Bug Causes Repeated Crashes

October 2, 2025
Smishing targets routers in Belgium 2025

MatrixPDF Toolkit Turns PDFs Into Lures

October 2, 2025
Microsoft Sentinel Unveils AI SIEM

Apple Pushes iPhone and Mac Updates

October 1, 2025
Microsoft Sentinel Unveils AI SIEM

Tesla Fixes TCU Bug With USB Risk

October 1, 2025
Microsoft Sentinel Unveils AI SIEM

EvilAI Malware Posing As AI Tools

October 1, 2025

Latest Alerts

Outlook Bug Causes Repeated Crashes

Smishing targets routers in Belgium 2025

MatrixPDF Toolkit Turns PDFs Into Lures

Tesla Fixes TCU Bug With USB Risk

Apple Pushes iPhone and Mac Updates

EvilAI Malware Posing As AI Tools

Subscribe to our newsletter

    Latest Incidents

    Allianz Life July Breach Hits 1.5M

    Dealership Software Breach Hits 766k

    Suffolk Website Down After Cyber-Attack

    WestJet Confirms Data Breach

    Ransomware Gang Recruits Reporter

    US Surveillance Hack Exposes Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial