Akira Ransomware Gang: A Growing Threat to SonicWall Devices
Recent Warnings from Cybersecurity Experts
The Akira ransomware gang has been making headlines as it actively targets Australian businesses that utilize SonicWall firewall devices. In response to this increasing threat, the Australian Cyber Security Centre (ACSC) issued a significant warning to companies, emphasizing the serious risk posed by the gang. The ACSC’s alert highlights Akira’s tactics, primarily focusing on a vulnerability that has existed for over a year, designated CVE-2024-40766.
Understanding the Exploitation of Vulnerabilities
While the ACSC brought attention to a specific vulnerability, the reality is that Akira employs a more intricate attack strategy. Analysts have uncovered that the gang is not just exploiting this single weakness but rather leveraging multiple vulnerabilities to infiltrate their victims’ networks. This multi-faceted approach allows Akira to maximize its impact and increase its chances of success.
Insights from Rapid7’s Findings
Cybersecurity firm Rapid7 has responded to numerous incidents that indicate a worrying trend of Akira’s activities targeting SonicWall devices. Their research reveals that attackers are making headway by taking advantage of devices with default or unchanged passwords. Additionally, Rapid7 identified two crucial security weaknesses that further facilitate the hackers’ access.
In a blog post dated September 11, Rapid7 noted that SonicWall had published updated security guidelines concerning the SSLVPN Default Users Group Security Risk. This security risk points out that in certain configurations, access to SonicWall’s SSLVPN services may be excessively granted based on default LDAP group settings. Consequently, this could allow unauthorized users to gain access, putting organizations at considerable risk.
The Role of the Virtual Office Portal
Another area of concern is SonicWall’s Virtual Office Portal, which is intended to help organizations manage Multi-Factor Authentication (MFA) and Time-Based One-Time Passwords (TOTP). However, Rapid7 warns that certain default configurations permit public access to this portal. This security gap could enable threat actors to set up MFA/TOTP using valid credentials if prior username and password data has been exposed.
Through their ongoing investigations, Rapid7 has reported a troubling number of attacks—at least in the double digits—all attributed to the Akira group. Their incident response team is closely monitoring these patterns, identifying vulnerabilities, and actively working to closely track the attackers.
Proactive Measures Against Cyber Threats
Rapid7 emphasizes the importance of organizations being proactive in their cybersecurity efforts. Their recommendations for firms utilizing SonicWall devices are clear:
-
Validate Patch Levels: Ensure that all relevant updates and patches are applied to SonicWall products promptly.
-
Complete Recommended Remediation Steps: Follow all suggested security practices to minimize risk.
-
Audit Security Configurations: Organizations should conduct a thorough examination of their security settings, including an inventory of local accounts, LDAP group setups, and access policies for the Virtual Office Portal.
- Configure MFA Properly: Special care should be taken to ensure MFA settings are correctly implemented for all users.
Additionally, Rapid7 suggests that clients capable of collecting and storing SonicWall logs should do so, as these logs can be invaluable during security investigations.
The Broader Impact of Akira’s Campaign
Given Rapid7’s extensive customer base, which includes numerous organizations relying on SonicWall devices, the incident response team warns of the potential for Akira’s attacks to have widespread consequences across various industries. The situation remains fluid, and all stakeholders must remain vigilant to mitigate the risks associated with these sophisticated cyber threats.
For further insights into Rapid7’s ongoing investigations and recommendations, visit their dedicated resources on cybersecurity issues related to SonicWall devices. Taking these steps seriously can be the difference between falling victim to ransomware attacks and maintaining a robust security posture.


