Skip Navigation

Akira ransomware targeting SonicWall VPN appliances

Over the past week, Field Effect have observed a concerning uptick in targeted activity against SonicWall VPN appliances by the Akira ransomware group. This pattern has emerged across multiple customer environments, and while the full scope of the attack chain remains unclear, the implications are serious.

What we're seeing

The Akira group appears to be leveraging a previously unknown method to authenticate to SonicWall VPN appliances. In several cases, this access has led directly to the compromise of Domain Administrator credentials without any observable lateral movement or privilege escalation steps that would typically precede such access.

This suggests the possibility of a zero-day vulnerability in SonicWall’s VPN technology. As of this writing, SonicWall has not issued any advisories or acknowledgments of a vulnerability, but the consistency of the observed behavior across environments is troubling.

Anatomy of the attack

While the full exploit chain is still under investigation, the following pattern has emerged:

  1. Initial access: The attacker authenticates directly to the SonicWall VPN appliance.
  2. Credential access: Domain Administrator credentials are obtained rapidly via an unknown technique.
  3. Lateral movement: The threat actors will then target Domain Controllers and other devices on the network to attempt to exfiltrate sensitive data and ultimately deploy ransomware.

Notably, there is no evidence of phishing, brute force, or credential stuffing in these cases. The authentication appears legitimate, suggesting either credential theft via another unknown vector or exploitation of a flaw in the VPN authentication mechanism itself.

Why this matters

SonicWall VPN appliances are widely deployed across enterprise environments, often serving as the primary remote access gateway. A vulnerability in these systems, especially one that allows direct access to domain-level credentials, poses a significant risk to organizations relying on them for secure connectivity.

Our recommendations

Until more is known, we are urging all customers using SonicWall VPN appliances to take the following precautionary steps:

  • Disconnect VPN appliances from the internet immediately if possible.
  • Review authentication logs for unusual access patterns, especially successful logins from unexpected ISPs or locations.
  • Implement multi-factor authentication (MFA) across all remote access systems.
  • Engage with SonicWall support to request any available updates or security advisories.

What’s next

We are continuing to investigate this activity to determine the root cause. If a zero-day vulnerability is confirmed, we expect SonicWall to issue guidance and patches. In the meantime, proactive isolation and monitoring are the best defenses.

If you believe your organization may have been affected or would like assistance reviewing your environment, please reach out to our team.