SonicWall SSL VPN devices have become a prominent target for Akira ransomware attacks since mid-2025, with signs of a possible zero-day security flaw being exploited. Organizations are advised to take immediate mitigation steps, such as disabling VPN services and enforcing multi-factor authentication. #AkiraRansomware #SonicWallVulnerabilities
Keypoints
- SonicWall SSL VPN devices are increasingly targeted by Akira ransomware groups starting from July 2025.
- Multiple pre-ransomware intrusions suggest an ongoing, sustained attack campaign.
- The attacks may exploit an unknown zero-day flaw, as fully patched devices are affected.
- Immediate mitigation includes disabling VPN services and applying patches once available.
- Enforcing multi-factor authentication and improving password hygiene are recommended practices.
Read More: https://thehackernews.com/2025/08/akira-ransomware-exploits-sonicwall.html