Description
There has been a surge in Akira ransomware attacks targeting SonicWall firewall devices with SSL VPN enabled, initially suspected to be exploiting a previously undiscovered zero-day vulnerability. However, SonicWall has since clarified that this spike in activity is not linked to a new zero-day. Instead, there is strong evidence connecting the attacks to CVE-2024-40766, a high-severity (CVSS score: 9.3) improper access control vulnerability disclosed in August 2024. This flaw, affecting SonicOS management access, could allow unauthorized resource access and, under certain conditions, cause a firewall crash.
SonicWall further noted that many recent incidents involved organizations migrating from Gen 6 to Gen 7 firewalls without resetting local user passwords contrary to security recommendations for mitigating CVE-2024-40766. While the vulnerability has been patched, failure to follow migration best practices has left some devices exposed to credential-based attacks, password reuse, and brute-force attempts.
Attack Details
Arctic Wolf Labs observed multiple intrusions beginning on July 15, 2025, leveraging SonicWall SSL VPN access as the primary entry point. While brute-force, dictionary, and credential-stuffing attacks remain possible, the evidence now indicates exploitation of older vulnerabilities combined with weak password hygiene, rather than a zero-day. Once inside, attackers escalated privileges, stole credentials, disabled security tools, and deployed ransomware in patterns consistent with Akira’s known tactics. Threat actors made use of Virtual Private Servers (VPS) to connect via VPN differentiating their traffic from legitimate broadband users and enhancing anonymity.
Cybersecurity vendors, including Huntress, continue to report active exploitation of SonicWall Gen 7 firewall appliances. As of August 6, 2025, at least 28 confirmed incidents have been recorded, with targeting linked to both Akira and Fog ransomware groups.
Indicators of Compromise (IoCs)
Administrators should look out for the following signs of compromise:
Remediation
Arctic Wolf and SonicWall recommend the following actions:
Immediate Actions:
Updated SonicWall Recommendations:
The Guyana National CIRT recommends that users and administrators review this alert and apply it where necessary.
PDF Download: SonicWall Devices Exploited in Latest Akira Ransomware Campaign
References