Fraud Management & Cybercrime
,
Ransomware
Akira Ransomware Hackers Targeting SonicWall Devices

Firewall maker SonicWall said Friday all customers who used its cloud backup services are at increased “risk of targeted attacks” following a recent cyberattack.
See Also: Preparing for the Next Attack
The California firm in September disclosed that unidentified hackers launched brute-force attacks against servers storing backup files. Concluding its investigation on Friday, the company said hackers accessed configuration backup files for all customers who used the MySonicWall.com cloud backup service. The company initially asserted that hackers stole configuration data of just roughly 5% of its customer base (see: Hackers Steal SonicWall Firewall Configurations).
“The files contain encrypted credentials and configuration data; while encryption remains in place, possession of these files could increase the risk of targeted attacks,” the company said.
The stolen files could give hackers “critical information such as user, group, and domain settings, DNS and log settings, and certificates,” security firm Artic Wolf said.
SonicWall on Friday released additional security hardening measures. These include transferring the symbols export, or EXP, file to the MySonicWall Cloud Backup API over HTTPS and encrypting and compressing the file before storing it.
The company said that it is working with Google Mandiant to further enhance its cloud infrastructure and monitoring systems. SonicWall and Mandiant did not immediately respond to a request for comment.
SonicWall previously said the latest attack is not a ransomware incident. Security firm Rapid7 has observed a hacker wielding Akira ransomware targeting SonicWall devices using CVE-2024-40766, an authentication vulnerability impacting SonicWall SonicOS management access and VPN instances.
ArticWolf in late September said it began noticing in July a surge in hackers obtaining access to SonicWall devices through malicious SSL VPN logins in order to deploy the Akira crypto-locking malware.
Darktrace said Thursday it detected a surge in Akira network scanning and reconnaissance, lateral movement, privilege escalation, and data exfiltration targeting SonicWall customers in the United States.
Analysis of the Akira campaign by Darktrace suggests the group likely used SonicWall VPN devices to exfiltrate gigabytes of data.
Darktrace also said Akira hackers are likely exploiting three other misconfigurations to compromise SonicWall customers. These include misconfigurations related to local user accounts without password resets, SSL VPN instances where default user groups are enabled and exposed virtual office portals. These misconfigurations could allow attackers to reuse stolen authentication credentials, bypass Active Directory to gain access, as well as validate tokens for previously exposed passwords.