Particle.news

Download on the App Store

Akira Campaign Bypasses OTP on SonicWall VPNs, Accelerating Ransomware Intrusions

Researchers say reused credentials plus likely stolen OTP seeds let intruders regain VPN access despite patches.

Overview

  • Arctic Wolf reports dozens of recent incidents where SonicWall SSL VPN logins succeeded on accounts with OTP-based MFA, often after multiple challenges that indicate automated attempts.
  • The ongoing activity is tied to CVE-2024-40766, with attackers reusing credentials harvested before remediation; SonicWall has urged full VPN credential resets and upgrades to current SonicOS releases.
  • Post-access actions begin within minutes, with internal scanning, Impacket SMB session setup, RDP logins, and Active Directory enumeration, alongside a focus on Veeam backup systems to extract stored credentials.
  • Affiliates use Bring-Your-Own-Vulnerable-Driver tactics by abusing consent.exe to sideload DLLs that load vulnerable drivers such as rwdrv.sys and churchill_driver.sys to disable endpoint protections.
  • Defenders are advised to monitor for VPN logins from hosting-provider ASNs, block VPS and risky geographies, watch for Impacket SMB activity, and note that some intrusions leveraged installed tools like Datto RMM to blend in.