This long -exposed Sonicwall error is used to infect organizations with Akira Ransomware – so patch now


  • Akira Ransomware utilizes a year old Sonicwall SSLVPN error targeting non-bound Gen5-Gen7 Firewalls
  • Attackers also abuses default LDAP group settings and public access to the virtual office portal
  • Rapid7 warns that Akira combines more weaknesses and encourages companies to patch systems

A vulnerability in Sonicwall’s SSLVPN deposits that were discovered and patched more than a year ago is now being abused by Akira Ransomware operators, warns security researchers.

Miscreants go after companies that have not yet used patched or otherwise reduced the risk.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top