Firewalls, Routers, Endpoint/Device Security

SonicWall SSL VPN accounts targeted by Akira, Fog ransomware gangs

Share

At least 30 intrusions involving the exploitation of the critical SonicWall SSL VPN access control bug, tracked as CVE-2024-40766, have been conducted by the Akira and Fog ransomware gangs against several industries since August, with the former responsible for 75% of the incidents, reports BleepingComputer.

Most of the attacks — which share the same infrastructure, indicating the groups' continued partnership after exploiting a critical Veeam backup flaw — took nearly 10 hours from initial compromise to data encryption, while many involved the utilization of VPN/VPS for endpoint access, according to an analysis from Arctic Wolf, which also showed the absence of multi-factor authentication on the breached SSL VPN accounts. Additional findings revealed that virtual machines and backups were primarily subjected to the groups' rapid encryption attacks, which targeted documents and proprietary software but not files or sensitive documents that were older than six months or 30 months, respectively.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.