Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Akira Ransomware Beats SonicWall VPN MFA

September 29, 2025
Reading Time: 3 mins read
in Alerts
Ransomware Hits Ohio Union County

Since July 2025, the Akira ransomware campaign has been exploiting SonicWall NSA and TZ series devices running SonicOS 6-8. Researchers suspect the attackers are using credentials stolen from the CVE-2024-40766 vulnerability, as the exploits remain effective even after firmware updates. The attacks are notable for their speed and sophistication, often spreading rapidly across networks after a successful login. Attackers bypass OTP MFA, suggesting they may have stolen valid credentials or OTP seeds. The initial logins frequently originate from suspicious sources like VPS providers or privacy VPNs, which is a red flag for network administrators.

Once inside a network, the attackers move with incredible speed. Within minutes of gaining access, they begin internal network scanning using tools like SoftPerfect and Advanced IP Scanner, targeting common ports. They use Impacket and RDP for lateral movement and deploy various tools like nltest, dsquery, and BloodHound for Active Directory enumeration. All reconnaissance files are systematically saved to temporary directories like C:\ProgramData or Temp, showing a highly organized approach to mapping the victim’s environment before further compromise.

he attackers also focus on finding and extracting valuable data, including VM storage and backups, which often contain sensitive information and domain credentials. They use specialized tools to extract and decrypt Veeam credentials, and they even temporarily alter PostgreSQL configurations to facilitate their operations. To maintain persistence, the attackers create local and domain admin accounts, install Remote Monitoring and Management (RMM) tools like AnyDesk and TeamViewer, and establish covert access using SSH reverse tunnels and Cloudflare Tunnel.

To avoid detection, the attackers use a range of sophisticated evasion techniques. They disable RMMs and delete Volume Shadow Copies to hinder recovery. They also attempt to disable Windows Defender and other EDR solutions and have even been seen using a BYOVD (Bring Your Own Vulnerable Driver) technique, repackaging legitimate Microsoft files to disguise their activities. After packaging files for exfiltration using WinRAR, they use tools like rclone or FileZilla to transfer the archives to VPS hosts.

The final step of the attack is the deployment of the Akira ransomware executable. The ransomware is often placed in multiple locations and encrypts the entire environment within a few hours. Due to the high-stakes nature of these attacks, the most critical mitigation is to immediately reset all SSL VPN credentials on any SonicWall device that has ever run a firmware vulnerable to CVE-2024-40766. This also includes resetting Active Directory credentials for all accounts used for SSL VPN access and LDAP synchronization.

Reference:

  • Akira Ransomware Bypasses MFA On SonicWall VPNs Exploits Auth Flaw To Access Net
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecuritySeptember 2025
ADVERTISEMENT

Related Posts

Ransomware Hits Ohio Union County

MacOS XCSSET Variant Hits Firefox

September 29, 2025
Ransomware Hits Ohio Union County

UK NCSC Warns Of Cisco Firewall Exploits

September 29, 2025
Fake PyPI Login Site Steals Credentials

Fake PyPI Login Site Steals Credentials

September 26, 2025
Fake PyPI Login Site Steals Credentials

Google Warns of BRICKSTORM Malware

September 26, 2025
Fake PyPI Login Site Steals Credentials

Hidden WordPress Backdoors Create Admins

September 26, 2025
BadIIS Malware Spreads Via SEO Poisoning

Hackers Target AWS and Steal Credentials

September 24, 2025

Latest Alerts

MacOS XCSSET Variant Hits Firefox

Akira Ransomware Beats SonicWall VPN MFA

UK NCSC Warns Of Cisco Firewall Exploits

Fake PyPI Login Site Steals Credentials

Google Warns of BRICKSTORM Malware

Hidden WordPress Backdoors Create Admins

Subscribe to our newsletter

    Latest Incidents

    Medusa Ransomware Hits Comcast Data

    Ransomware Hits Ohio Union County

    DataCenter Fire Shuts South Korea Sites

    Indian Bank Transfer Records Exposed

    Chinese Cyberspies Hit US Defense Firms

    Neon App Shuts Down After Data Leak

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial