Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Akira Ransomware Attacks Fuel Uptick in Exploitation of SonicWall Flaw

Posted on September 11, 2025September 11, 2025 By CWS

The Akira ransomware group has been exploiting a year-old vulnerability in SonicWall firewalls in a contemporary spherical of assaults, probably combining three assault vectors for preliminary entry, Rapid7 warns.

The focused flaw, tracked as CVE-2024-40766 (CVSS rating of 9.3), is described as an improper entry management difficulty that would permit attackers to entry restricted sources and crash the firewall in sure circumstances.

Exploitation of the bug was noticed shortly after SonicWall revealed its advisory in August 2024. The corporate up to date the preliminary data to supply extra mitigation suggestions.

“SonicWall strongly recommends that each one customers of Gen5 and Gen6 firewalls with regionally managed SSLVPN accounts instantly replace their passwords to reinforce safety and stop unauthorized entry. Directors should allow the ‘Person should change password’ possibility for every native account,” the corporate stated.

Final month, safety researchers warned of a possible zero-day exploitation after a contemporary wave of assaults hit SonicWall home equipment, however the vendor linked the intrusions to CVE-2024-40766.

Now, Rapid7 says it has noticed a surge within the exploitation of susceptible SonicWall firewalls, fueled by the August assault marketing campaign, which was attributed to the Akira ransomware group.

In response to the cybersecurity agency, nevertheless, the year-old vulnerability is likely to be solely one of many assault vectors employed by Akira as a part of this marketing campaign.

The SSLVPN Default Customers Group, a safety danger permitting customers to acquire entry to the SSLVPN even when they don’t seem to be allowed to, may have additionally been exploited.Commercial. Scroll to proceed studying.

Moreover, the attackers might need been accessing the Digital Workplace Portal on SonicWall home equipment, which can be configured for public entry.

“Proof collected throughout Rapid7’s investigations means that the Akira group is probably using a mix of all three of those safety dangers to realize unauthorized entry and conduct ransomware operations,” the cybersecurity agency notes.

Lively since at the least 2023, the Akira ransomware gang targets edge gadgets for preliminary entry, escalates privileges, steals delicate recordsdata and knowledge, erases backups, and deploys file-encrypting ransomware on the hypervisor degree.

Organizations are suggested to use the patches launched by SonicWall as quickly as attainable, to use all of the mitigations beneficial by the seller, rotate the passwords for all SonicWall accounts, guarantee MFA is enabled for SSLVPN providers, mitigate the SSLVPN Default Teams safety danger, and limit entry to the Digital Workplace Portal.

Associated: US Gives $10 Million Reward for Ukrainian Ransomware Operator

Associated: Menace Actor Related to Play, RansomHub and DragonForce Ransomware Operations

Associated: Webinar on Demand: Defending Executives and Enterprises from Digital, Narrative and Bodily Assaults

Associated: Google DeepMind Unveils Protection Towards Oblique Immediate Injection Assaults

Security Week News Tags:Akira, Attacks, Exploitation, Flaw, Fuel, Ransomware, SonicWall, Uptick

Post navigation

Previous Post: UAE’s K2 Think AI Jailbroken Through Its Own Transparency Features
Next Post: New Attack Technique That Enables Attackers To Exfiltrate Git Credentials In Argocd

Related Posts

US Offers $10 Million for Three Russian Energy Firm Hackers Security Week News
MITRE Publishes Post-Quantum Cryptography Migration Roadmap Security Week News
Tri-Century Eye Care Data Breach Impacts 200,000 Individuals Security Week News
Critical Dolby Vulnerability Patched in Android Security Week News
Zero Trust Is 15 Years Old — Why Full Adoption Is Worth the Struggle Security Week News
Harvard Is First Confirmed Victim of Oracle EBS Zero-Day Hack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
  • Critical Ivanti Endpoint Manager RCE Vulnerabilities Actively Exploited in Attacks
  • Ivanti Patches Exploited EPMM Zero-Days
  • Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup
  • Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
  • Critical Ivanti Endpoint Manager RCE Vulnerabilities Actively Exploited in Attacks
  • Ivanti Patches Exploited EPMM Zero-Days
  • Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup
  • Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark