The Akira ransomware group has resumed exploiting a critical vulnerability in SonicWall SSLVPN devices, identified as CVE-2023-3519. This flaw allows attackers to bypass authentication and gain unauthorized access to vulnerable SonicWall SSLVPN appliances. Once inside, the threat actors deploy the Akira ransomware to encrypt victims' data and demand ransom payments. SonicWall has issued patches and urged users to update their systems immediately to mitigate the risk. The resurgence of attacks exploiting this vulnerability highlights the persistent threat posed by ransomware groups leveraging unpatched security flaws in widely used VPN solutions. Organizations using SonicWall SSLVPN devices should prioritize patching and implement additional security measures such as network segmentation and multi-factor authentication to reduce exposure. The Akira ransomware is known for its aggressive encryption tactics and ransom demands, making timely mitigation critical to prevent significant operational disruption and data loss. This incident underscores the importance of continuous vulnerability management and proactive defense strategies in the face of evolving ransomware threats targeting critical network infrastructure.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Thu, 11 Sep 2025 16:35:15 +0000