This alert highlights the active exploitation of a Zero-Day vulnerability in SonicWall SSLVPN to bypass MFA and deploy ransomware such as Akira Ransomware. Organizations are advised to monitor SonicWall updates, strengthen security measures, and report any suspicious activity. #SonicWallSSLVPN #AkiraRansomware
Keypoints
- A Zero-Day vulnerability in SonicWall SSLVPN is being actively exploited by threat actors.
- The exploit allows bypassing multi-factor authentication (MFA) to deploy ransomware.
- Organizations should disable SSLVPN services, limit access, and enable security features like Botnet Protection.
- It is crucial to apply firmware updates and monitor affected SonicWall Firewalls immediately.
- The Cyber Centre recommends reviewing security practices and reporting any suspicious activity promptly.