Akira Ransomware Targets SonicWall VPNs in Suspected Zero-Day Attack
Akira ransomware is exploiting SonicWall SSL VPN devices in a suspected zero-day attack, breaching fully-patched systems and exposing a new vulnerability. Organizations using SonicWall VPNs are at immediate risk.
By
Content Team
ON THIS PAGE
Want more insights like this?
Subscribe to our newsletter to get the latest software protection strategies delivered to your inbox.
By submitting your email, you consent to Codekeeper contacting you and agree to our privacy policy.
Cybercriminals behind Akira ransomware are exploiting SonicWall SSL VPN devices in what appears to be a zero-day attack, successfully breaching fully-patched systems. The attacks target organizations using SonicWall's VPN infrastructure, raising serious concerns about a previously unknown vulnerability.
Since the compromised devices were up-to-date with security patches, security experts suspect attackers discovered and weaponized a new flaw before SonicWall could address it. Organizations using SonicWall VPNs face immediate risk and should monitor their networks closely for suspicious activity while awaiting official patches.
Source: The Hacker News
Have questions about protecting your software?
Our escrow experts are standing by to help.
Book a free demo