Visual guide on safeguarding personal data against cyber attacks with effective strategies and tips.

By taking use of the crucial CVE-2024-40766 vulnerability that was just discovered in SonicWall’s SSL VPN technology, the ransomware gangs Fog and Akira are attempting to breach corporate networks by targeting SonicWall VPNs. This vulnerability was found and fixed in August 2024, but some businesses have not yet implemented the required changes, therefore it still poses a risk.

More than 30 corporate compromises have been connected to this vulnerability, impacting businesses all around the world, according to security specialists at Arctic Wolf. Akira affiliates are mostly involved in these breaches; 75% of reported intrusions are linked to Akira, with the remaining attacks being caused by Fog ransomware. The fact that both parties appear to employ the same infrastructure points to a continuing partnership.

In these cases, hackers used out-of-date SonicWall VPN accounts to gain access to weak networks. The threat actors acted swiftly after signing in, occasionally encrypting important data in as little as two hours.

In an effort to inflict as much disturbance as possible, Arctic Wolf discovered that these quick attacks mostly targeted backups and virtual machines. These attacks are more likely to occur because compromised firms frequently maintained their VPN services on the default port, 4433. Multi-factor authentication (MFA) was not enabled in any of the incursions.

Arctic Wolf’s study of the logs shed more light on the development of these breaches. Attackers’ access points were identified by events with the labels “WAN zone remote user login allowed” (ID 238) and “SSL VPN zone remote user login allowed” (ID 1080). Once inside, the attackers successfully completed the IP assignments and login, according to additional event logs (ID 1079).

Attackers frequently ignored data older than six months and concentrated mostly on newer papers. However, the threshold was raised to 30 months for more sensitive material.

Launched in May 2024, the fog ransomware is still spreading, and its affiliates frequently utilize compromised VPN credentials. Although there were recent issues with its Tor website, Akira has subsequently started functioning again.

Around 168,000 SonicWall endpoints worldwide, according to Japanese researcher Yutaka Sejiyama, are still susceptible to CVE-2024-40766. This highlights how urgent it is for businesses to fix their systems and put security measures like MFA in place.

150 million ransomware delivery attempts were made against SonicWall in the first half of 2023, which saw similar attacks. In the past, Akira has also taken advantage of Cisco VPN products.

Akira and Fog Ransomware Take Advantage of a SonicWall VPN Vulnerability Details

Languages:
Established:

Leave a Reply

Your email address will not be published. Required fields are marked *

Recent Comments

No comments to show.

New Providers
Tunnel Bear

2GB free per month
Includes strong encryption, user-friendly interface, and access to 8,000+ servers worldwide.

Hotspot Shield

10 devices supported
Includes a 45-day money-back guarantee and features advanced malware protection.

Vypr VPN

30-day money-back guarantee
Includes Chameleon™ protocol for bypassing restrictions, split tunneling, and 10 simultaneous connections.

Surf Shark

Unlimited devices
Includes antivirus, ad blocker, and a private search engine for safer browsing.

Express VPN

3 months free
Includes unlimited bandwidth, high-speed Lightway protocol, and 24/7 live chat support.

Akira and Fog Ransomware Take Advantage of a SonicWall VPN Vulnerability
0.0/10
Copyright Notice © https://top-privacy-vpn.com/, 2024. All rights reserved. The logo and design of this website are the exclusive property of https://top-privacy-vpn.com/ and are protected by international copyright laws. All other logos and trademarks belong to their respective VPN providers. The information and comparisons provided are for informational purposes and belong to https://top-privacy-vpn.com/. Unauthorized use, reproduction, or distribution of this website’s design, logo, and content is strictly prohibited without prior written permission. For permissions or inquiries, please contact : support@top-privacy-vpn.com