Critical Alert: Akira Ransomware Surge Targets SonicWall Firewalls
Overview Since mid‑July 2025, there has been a marked increase in Akira ransomware attacks exploiting SonicWall SSL VPN connections. Multiple security research teams, including Arctic Wolf Labs, have observed active exploitation, with incidents frequently tied to devices running unpatched versions of SonicOS. What's Happening Initial vector: Many intrusions begin through unauthorized access to SonicWall SSL VPN accounts, often using locally stored credentials rather than centralized authentication. In nearly every case observed, Multi‑Factor Authentication (MFA) was disabled. Rapid escalation: Once connected, threat actors often move quickly from VPN access to system encryption and data exfiltration within hours. Potential root cause: Evidence suggests exploitation of a SonicWall zero‑day vulnerability (CVE‑2024‑40766), an improper access control flaw in SonicOS affecting Gen 5, Gen 6, and early Gen 7 devices (up to version 7.0.1‑5035). Credential‑based attacks such as brute force have also been noted as possible vectors. Vendor response: SonicWall released patches for CVE‑2024‑40766 in August 2024, later…