Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
Akira Ransomware Targeting Critical Vulnerability in SonicWall SSLVPN

Akira Ransomware Targeting Critical Vulnerability in SonicWall SSLVPN

Type
Campaign
Actors
❓Unknown
Pub. date
August 6, 2025
Initial access
1-day vulnerability
Impact
RansomOp
Observed techniques
Vulnerability exploitationMFA bypass
Observed tools
Akira ransomware
Targeted technologies
SonicWall firewall
References
https://www.huntress.com/blog/exploitation-of-sonicwall-vpn
Status
Finalized
Last edited
Aug 7, 2025 12:51 PM

Researchers identified active exploitation of CVE-2024-40766 in SonicWall's seventh-generation firewalls, specifically impacting SSL VPN functionality. Threat actors are bypassing multi-factor authentication (MFA), gaining privileged access, and deploying Akira ransomware.

The attacks target SonicWall TZ and NSa-series firewalls running firmware versions 7.2.0-7015 or earlier, exploiting CVE-2024-40766. The compromise begins at the perimeter, allowing attackers to bypass MFA and gain access using over-privileged service accounts (e.g., sonicwall, LDAPAdmin). Once inside, attackers establish persistence using Cloudflared tunnels, OpenSSH, and RMM tools like AnyDesk, and pivot laterally using WMI, PowerShell Remoting, and brute-forced RDP sessions.

The post-exploitation phase is fast and methodical: attackers exfiltrate credentials (e.g., from Veeam, NTDS.dit), disable defenses using Set-MpPreference and netsh, and delete recovery artifacts (vssadmin.exe). The final payload is the Akira ransomware, often delivered after wiping Volume Shadow Copies.