Akira Ransomware Strikes Again: SonicWall VPNs Caught in Zero-Day Crossfire!
Akira ransomware is throwing a zero-day party, and SonicWall VPNs are the uninvited guests. Even fully patched devices are falling prey, despite MFA and new credentials. Arctic Wolf Labs urges organizations to disable SonicWall SSL VPNs until a patch arrives. Meanwhile, hackers are using VPS hosting to crash the VPN party in style.

Hot Take:
Looks like Akira is taking a page out of the “ninja handbook” with its stealthy zero-day attacks on SonicWall VPNs. Even fully patched systems are feeling the burn, proving once again that in the world of cybersecurity, you can never be too paranoid. Lock your digital doors, folks, because Akira is in the house and it’s not bringing gifts!
Key Points:
- Akira ransomware is exploiting a likely zero-day in SonicWall SSL VPNs.
- Fully patched devices with MFA are still being compromised.
- Evidence shows attackers using VPS hosting to mimic legitimate access.
- Organizations are advised to disable SonicWall SSL VPN until a patch is available.
- Akira ransomware has been active since March 2023, targeting various industries.
Already a member? Log in here