Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»SonicWall SSL VPN Attacks Escalate, Bypassing MFA
Cyber Security

SonicWall SSL VPN Attacks Escalate, Bypassing MFA

Team-CWDBy Team-CWDSeptember 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security experts have warned of a surge in malicious activity from Akira ransomware actors targeted at victims running SonicWall SSL VPN appliances.

The campaign appears to have begun back in late July, with initial reports suggesting a zero-day vulnerability may have been to blame.

These were later dismissed, with legacy bug CVE-2024-40766 blamed for initial access.

A new report published on Friday by Arctic Wolf claimed that exploitation of this improper access control vulnerability supported credential harvesting. This subsequently enabled those devices to be targeted, even if they had been patched, it said.

“With dwell times measured in hours rather than days – among the shortest we’ve recorded for ransomware – the window for effective response against this threat is exceptionally narrow,” Arctic Wolf warned.

Read more on SonicWall VPN attacks: SonicWall Discloses Compromise of Cloud Backup Service

The report claimed that most attacks observed in this campaign contain similar elements:

  • VPN client logins originating from hosting providers
  • Internal network scanning
  • Impacket SMB activity tied to discovery
  • Active Directory discovery

OTP Bypass

Interestingly, the threat actors have also been able to compromise devices running one-time password (OTP) multi-factor authentication (MFA).

“In our investigation, we observed repeated malicious SSL VPN logins on accounts with OTP MFA enabled, ruling out scratch code usage in those cases. We also found no signs of malicious use of the compromised accounts prior to SSL VPN login, nor did we observe unauthorized OTP unbinding events or other malicious configuration changes in the five days leading up to the intrusions,” the report continued.

“Taken together, the evidence points to the use of valid credentials rather than modification of OTP configuration, though the exact method of authenticating against MFA-enabled accounts remains unclear.”

One possible explanation is that threat actors managed to obtain OTP seeds.

“Google Threat Intelligence Group recently uncovered a campaign affecting SonicWall SMA demonstrating that if OTP seeds are obtained by threat actors, they can be used to generate valid OTP tokens,” Arctic Wolf said.

There are also hints that adversaries used automated tooling to achieve initial access and lateral movement. Arctic Wolf said it recorded multiple login events in quick succession across a number of accounts, from the same VPN client IP address.

“Upon gaining SSL VPN access, threat actors wasted no time in attempting lateral movement through compromised environments, typically initiating internal scanning within five minutes of logging in,” it added.

Bring-Your-Own-Vulnerable-Driver (BYOVD) techniques were also used to evade detection by security tools.

“Early detection is critical in this campaign, and to that end we recommend monitoring for hosting-related ASNs in SonicWall SSL VPN logins,” Arctic Wolf concluded.

“Additionally, monitoring for SMB session setup requests consistent with Impacket provides an early kill chain detection for discovery activity related to this campaign.”

The security vendor also advised blocking logins from infrastructure linked to virtual private server (VPS) hosting providers and anonymization services, as well as restricting VPN logins from countries where the organization does not do business.

Image credit: Michael Vi / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAI-Generated Code Used in Phishing Campaign Blocked by Microsoft
Next Article Harrods Reveals Supply Chain Breach Impacting Online Customers
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What is it, and how do I get it off my device?

September 11, 2025

How to help older family members avoid scams

October 31, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.