Since July 2025, the Akira ransomware has been putting organizations worldwide on edge by exploiting vulnerabilities in SonicWall SSL VPNs. The alarming part? Even with passwords and multi-factor authentication (MFA) enabled, attackers are successfully breaching corporate networks. This not only exposes critical data but also shows how cybercrime sophistication is outpacing traditional defenses.
At TecnetOne, we’ll explain what’s happening, how this threat works, and the practical steps you can take to reduce risk in your organization.
Attackers appear to be leveraging CVE-2024-40766, a critical flaw discovered months earlier in SonicWall. Although the company issued patches to strengthen security against brute-force attacks and MFA issues, many credentials stolen during the initial exploitation remain valid even after firmware updates.
In practice, this means that even if you’ve applied updates, your devices may still be at risk if they were exposed at the time.
The most unsettling aspect is that attackers aren’t just using stolen credentials—they also seem to have compromised OTP seeds, enabling them to bypass MFA entirely.
In over 50% of analyzed intrusions, criminals authenticated into accounts with OTP enabled. This raises a troubling reality: measures once seen as the “last line of defense” are no longer enough.
Learn more: How to detect Medusa Ransomware with Wazuh?
Once inside the VPN, attackers move with surgical speed. In under five minutes, they’re scanning the internal network for vulnerabilities and access to services like RPC, NetBIOS, SMB, and SQL.
Common steps include:
Within hours—sometimes less than 60 minutes—attackers have already packaged sensitive data with WinRAR, exfiltrated it using tools like rclone or FileZilla, and deployed ransomware to multiple critical directories.
Akira is not just another ransomware. Its techniques include:
The result: in less than half a day, attackers can encrypt your entire network and steal sensitive information, leaving you with two crises—data loss and extortion.
Also of interest: Dark Web Profile of the SafePay Ransomware
At TecnetOne, we believe prevention remains your strongest ally. Key recommendations:
The Akira case is a reminder that even with patches and MFA enabled, attackers can still find ways in. The difference between a scare and a catastrophe lies in your ability to detect and respond quickly.
At TecnetOne, we work with our partners to deliver advanced cybersecurity solutions—including 24/7 monitoring, vulnerability management, Red Team simulations, and critical infrastructure protection.
Don’t wait to become the next victim. Attackers already know where to look, and if your VPN is a weak point, they will try sooner or later.