Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Akira Ransomware Attacks Fuel Uptick in Exploitation of SonicWall Flaw

Akira Ransomware Attacks Fuel Uptick in Exploitation of SonicWall Flaw

Posted on September 11, 2025September 11, 2025 By CWS

The Akira ransomware group has been exploiting a year-old vulnerability in SonicWall firewalls in a contemporary spherical of assaults, probably combining three assault vectors for preliminary entry, Rapid7 warns.

The focused flaw, tracked as CVE-2024-40766 (CVSS rating of 9.3), is described as an improper entry management difficulty that would permit attackers to entry restricted sources and crash the firewall in sure circumstances.

Exploitation of the bug was noticed shortly after SonicWall revealed its advisory in August 2024. The corporate up to date the preliminary data to supply extra mitigation suggestions.

“SonicWall strongly recommends that each one customers of Gen5 and Gen6 firewalls with regionally managed SSLVPN accounts instantly replace their passwords to reinforce safety and stop unauthorized entry. Directors should allow the ‘Person should change password’ possibility for every native account,” the corporate stated.

Final month, safety researchers warned of a possible zero-day exploitation after a contemporary wave of assaults hit SonicWall home equipment, however the vendor linked the intrusions to CVE-2024-40766.

Now, Rapid7 says it has noticed a surge within the exploitation of susceptible SonicWall firewalls, fueled by the August assault marketing campaign, which was attributed to the Akira ransomware group.

In response to the cybersecurity agency, nevertheless, the year-old vulnerability is likely to be solely one of many assault vectors employed by Akira as a part of this marketing campaign.

The SSLVPN Default Customers Group, a safety danger permitting customers to acquire entry to the SSLVPN even when they don’t seem to be allowed to, may have additionally been exploited.Commercial. Scroll to proceed studying.

Moreover, the attackers might need been accessing the Digital Workplace Portal on SonicWall home equipment, which can be configured for public entry.

“Proof collected throughout Rapid7’s investigations means that the Akira group is probably using a mix of all three of those safety dangers to realize unauthorized entry and conduct ransomware operations,” the cybersecurity agency notes.

Lively since at the least 2023, the Akira ransomware gang targets edge gadgets for preliminary entry, escalates privileges, steals delicate recordsdata and knowledge, erases backups, and deploys file-encrypting ransomware on the hypervisor degree.

Organizations are suggested to use the patches launched by SonicWall as quickly as attainable, to use all of the mitigations beneficial by the seller, rotate the passwords for all SonicWall accounts, guarantee MFA is enabled for SSLVPN providers, mitigate the SSLVPN Default Teams safety danger, and limit entry to the Digital Workplace Portal.

Associated: US Gives $10 Million Reward for Ukrainian Ransomware Operator

Associated: Menace Actor Related to Play, RansomHub and DragonForce Ransomware Operations

Associated: Webinar on Demand: Defending Executives and Enterprises from Digital, Narrative and Bodily Assaults

Associated: Google DeepMind Unveils Protection Towards Oblique Immediate Injection Assaults

Security Week News Tags:Akira, Attacks, Exploitation, Flaw, Fuel, Ransomware, SonicWall, Uptick

Post navigation

Previous Post: UAE’s K2 Think AI Jailbroken Through Its Own Transparency Features
Next Post: New Attack Technique That Enables Attackers To Exfiltrate Git Credentials In Argocd

Related Posts

Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks Security Week News
Australian Human Rights Commission Discloses Data Breach Australian Human Rights Commission Discloses Data Breach Security Week News
SBOM Pioneer Allan Friedman Joins NetRise to Advance Supply Chain Visibility SBOM Pioneer Allan Friedman Joins NetRise to Advance Supply Chain Visibility Security Week News
Ahold Delhaize Data Breach Impacts 2.2 Million People Ahold Delhaize Data Breach Impacts 2.2 Million People Security Week News
VS Code Flaws in GitHub Codespaces Risk Supply Chain Attacks VS Code Flaws in GitHub Codespaces Risk Supply Chain Attacks Security Week News
Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News