Ransomware, Vulnerability Management, Patch/Configuration Management, IoT

Vulnerable webcam leveraged in clandestine Akira ransomware attack

Cyber basics

Exploiting an unsecured webcam enabled the Akira ransomware operation to successfully launch endpoint detection and response system-evading encryption attacks against a targeted organization whose EDR initially prevented encryptor execution in Windows devices, according to BleepingComputer.

Infiltration of the targeted corporate network through an exposed remote access solution already allowed Akira to deliver AnyDesk, exfiltrate data, and leverage Remote Desktop Protocol for lateral movement only for its succeeding ransomware payload to be blocked by the EDR tool, prompting another network scan that resulted in the discovery of the vulnerable Linux-based webcam, a report from cybersecurity firm S-RM revealed.

After mounting Windows Server Message Block network shares of the organization's devices on the webcam, Akira proceeded to launch its Linux encryptor without being detected by the EDR software, said researchers, who noted that the attack could have been prevented had the organization remediated the webcam's flaws.

Such findings indicate the pitfalls of EDRs, which should prompt the implementation of other security measures, including access restrictions for IoT devices.

An In-Depth Guide to Ransomware

Get essential knowledge and practical strategies to protect your organization from ransomware attacks.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds