Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Akira Ransomware Hits SonicWall Firewalls as Attacks Escalate
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Akira Ransomware Hits SonicWall Firewalls as Attacks Escalate

Highlights

  • Akira ransomware exploits SonicWall firewalls via known vulnerability CVE-2024-40766.

  • Misconfigurations and neglected password resets enable unauthorized access after patching.

  • Experts advise thorough configuration checks and enabling multifactor authentication.

Kaan Demirel
Last updated: 12 September, 2025 - 8:19 pm 8:19 pm
Kaan Demirel 3 hours ago
Share
SHARE

Recent months have seen an uptick in cyber incidents targeting SonicWall firewalls, with security researchers tracking a series of Akira ransomware attacks exploiting a known vulnerability. Companies relying on SonicWall devices for network protection are now facing the consequences of both unpatched and misconfigured systems. The confidence that regular patching alone could keep attackers at bay has faded, and organizations are being forced to reconsider their current cybersecurity practices. This growing threat showcases the need for more comprehensive approaches to device configuration and ongoing vigilance in monitoring for suspicious activity.

Contents
How Have Attack Patterns Developed Over Recent Weeks?What Security Gaps Are Contributing to the Breaches?What Steps Are Being Recommended to Mitigate the Threat?

Earlier updates on SonicWall vulnerabilities focused on zero-day exploits, but findings now point to CVE-2024-40766 — a year-old flaw — as the primary attack vector. Researchers previously believed that patching would reduce incident volume; however, attackers have shifted tactics, targeting improper configurations and default directory access protocols. Unlike past incidents, the latest surge has brought attention to the critical importance of proper post-update procedures, such as password resets and multi-factor authentication.

How Have Attack Patterns Developed Over Recent Weeks?

Attackers began ramping up their activities around mid-July with around 40 recorded cases exploiting SonicWall’s SSL VPN protocol. Since then, security companies like Rapid7 have noticed a steady increase, intervening in multiple cases each week. According to Rapid7, attackers have managed to access devices either through neglected configuration steps or by leveraging weak credential management practices. The Australian Cyber Security Centre reported similar findings and has issued alerts to warn organizations about these risks.

What Security Gaps Are Contributing to the Breaches?

Misconfigured devices and unchanged default credentials have emerged as major factors behind the ongoing breaches. Even when customers migrated to newer firewall models or applied patches addressing CVE-2024-40766, additional security measures like password changes were often overlooked. Attackers have exploited default LDAP group permissions and have frequently targeted the virtual office portals in SonicWall devices, searching for compromised credentials or accounts missing multifactor authentication. As noted by Rapid7,

“In the vast majority of cases our team is working, the SonicWall firewalls have been upgraded to a version that patches CVE-2024-40766,”

but incomplete remediation lets attackers persist in their activities.

What Steps Are Being Recommended to Mitigate the Threat?

Security professionals are urging organizations to go beyond simple patching and check their device configurations thoroughly. Key recommendations include resetting all passwords after upgrading, limiting directory access permissions, and enabling multifactor authentication across all accounts. Rapid7 highlighted the persistent risk, stating,

“The remediation step of changing local passwords was not completed, and attackers were therefore able to gain unauthorized access to the devices.”

The Australian Cyber Security Centre has echoed these concerns, emphasizing proactive measures and continuous monitoring as vital strategies.

As the root causes of SonicWall attacks shift over time, organizations find that simply applying available patches does not guarantee immunity from ransomware threats. Broader industry experience with SonicWall shows repeated vulnerabilities — with CISA noting the vendor has appeared multiple times on its known exploited vulnerabilities catalog, often linked to ransomware. Actions taken must address not just patching but a holistic assessment of firewall configurations, authentication policies, and ongoing network surveillance. For businesses depending on SonicWall products, reviewing their risk profiles and response plans is now as important as staying updated on the latest software releases.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

CISA Maintains Operational Strength Despite Budget and Staff Reductions

Senator Demands FTC Probe Over Microsoft Security Defaults

Hackers Target Major npm Packages, Security Teams Respond Swiftly

Apple Introduces Memory Integrity Enforcement to Boost iPhone Security

Microsoft Patches 81 Vulnerabilities in September Update Release

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Intuitive Debuts Force Gauge and Video Replay for da Vinci 5
Next Article AI Agents Shift Responsibility as Identity Solutions Gain Urgency

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Tesla Boosts Security Measures for Elon Musk After Recent Events
Electric Vehicle
AI Agents Shift Responsibility as Identity Solutions Gain Urgency
AI Technology
Intuitive Debuts Force Gauge and Video Replay for da Vinci 5
Robotics
Tesla Stock Gains Momentum as Former Critic Changes Stance
Electric Vehicle
MSI Launches Exclusive GPU Overclocking Features for Upcoming Models
Computing
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?