08-23-2023 12:13 PM
Has anyone been updated or made aware of the Akira ransomware that is found to target VPN clients, and more specifically, Cisco VPN? Supposedly Akira was first noticed abusing VPN clients back in May, but was wondering if this is related to this advisory (https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-ac-csc-privesc-wx4U4Kw.html)
If anyone has any information so we can share with the community or at least spread the information, please share:
Supposedly it is taking advantage of VPN clients without a MFA solution in place, which stresses the importance of MFA.
Thanks in advance.
08-24-2023 02:30 AM - edited 08-24-2023 03:19 AM
Hello @secureB00T
Tried to analyze this problem a little more. the akira group has attacked officially about 89 companies so far
here is a list of affected companies parsed per country
Argentina 1 Australia 1 Bangladesh 1 Canada 6 India 1 Nicaragua 1 Portugal 1 Saudi Arabia 1 South Africa 1 Sweden 1 Switzerland 1 UK 3 USA 70
08-24-2023 08:02 AM
So the best option is to turn off VPN altogether? From my understanding, as long as there's MFA, access should be audited and monitored, also enabling firewall whitelisting and geo location blocking. I can see why if there's single factor authentication, one might turn it off as there's no way to check for brute force attacks. or is there?
If you don't mind me asking, what tools or resources did you use to verify that domains have their VPNs off now?
08-24-2023 01:49 PM
See the official response below:
https://blogs.cisco.com/security/akira-ransomware-targeting-vpns-without-multi-factor-authentication
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide