Critical Alert: SonicWall VPN Zero-Day Exploited to Bypass MFA, Deploy Ransomware

Ransomware Statistics
Ransomware attack statistics

Critical Alert: SonicWall VPN Zero-Day Exploited to Bypass MFA, Deploy Ransomware

A serious security threat is unfolding as SonicWall VPNs are being actively exploited through a likely zero-day vulnerability. This flaw allows attackers to bypass multi-factor authentication (MFA) and deploy ransomware, with the Akira ransomware group being a prominent actor. Organizations using SonicWall VPNs are urged to take immediate action to mitigate this risk.

50+ Ransomware Statistics & Facts for 2018-2022

50+ Ransomware Statistics & Facts for 2018-2022

The Threat: Zero-Day Exploitation and MFA Bypass

Recent reports indicate that a zero-day vulnerability is being exploited in SonicWall SSL VPN products. This vulnerability allows attackers to gain unauthorized access to corporate networks, even when MFA is enabled. The attackers are then able to move laterally within the network and deploy ransomware.

  • Attackers are bypassing MFA, indicating a sophisticated exploit.
  • Compromised VPN access is leading to rapid ransomware deployment.
  • Fully patched devices are still vulnerable, suggesting a zero-day.

Akira Ransomware: A Key Player

The Akira ransomware group is actively exploiting this vulnerability. They are targeting SonicWall VPNs to gain initial access to networks and then deploying their ransomware. This group has been observed moving quickly to compromise domain controllers after the initial breach.

Given the severity of this threat, organizations using SonicWall VPNs should take the following steps immediately:

  1. Disable the VPN service: This is the most effective way to prevent exploitation.
  2. Restrict access via IP allow-listing: If disabling the VPN is not possible, severely restrict access by only allowing connections from trusted IP addresses.
  3. Monitor network traffic: Look for suspicious activity, such as unusual login attempts or lateral movement.
  4. Review and update incident response plans: Ensure that your organization is prepared to respond to a ransomware attack.
  5. Apply available patches: While a zero-day is being exploited, ensure all other available patches are applied.

Key Takeaways

  • A zero-day vulnerability in SonicWall VPNs is being actively exploited.
  • Attackers are bypassing MFA to deploy ransomware.
  • The Akira ransomware group is a major threat actor in these attacks.
  • Immediate action is required to mitigate the risk.

References

Read more