Akira Ransomware Exploits SonicWall VPN Flaw — Global Surge
Cyber Security News by CyberSum.net
Between July and August 2025, a resurgence in Akira ransomware incidents targeted organizations through SonicWall SSL VPN appliances, exploiting a vulnerability first disclosed over a year ago — CVE-2024-40766. Darktrace’s Threat Research Team identified a coordinated campaign exploiting unpatched or misconfigured SonicWall devices for initial access, followed by lateral movement, credential harvesting, and data exfiltration. The campaign’s success is attributed to organizations failing to patch SonicWall devices or leaving configurations vulnerable. Akira ransomware, known for double extortion tactics, has expanded its reach across various sectors, including manufacturing, education, and healthcare. Darktrace’s MDR team intercepted an ongoing intrusion within a customer’s network, observing multiple stages of compromise, including network reconnaissance, lateral movement, credential theft, and data exfiltration.