HomeCyber BalkansAkira Ransomware Attacking Windows Servers through RDP and Avoiding EDR with Webcam...

Akira Ransomware Attacking Windows Servers through RDP and Avoiding EDR with Webcam Trick

Published on

spot_img

The Akira ransomware group has recently made headlines in the cybersecurity world for its innovative tactics in exploiting an unsecured webcam to bypass traditional security measures. This incident sheds light on the group’s ability to adapt and evolve, posing a significant threat to organizations worldwide.

Akira, a well-known ransomware group, has been at the forefront of numerous cybersecurity incidents, with the S-RM team responding to 15% of reported cases in 2024. Typically, Akira’s modus operandi involves infiltrating networks through external remote access solutions and using tools like AnyDesk.exe to maintain a foothold. The group often utilizes Remote Desktop Protocol (RDP) to move laterally within the network, disguising its activities as legitimate system administrator tasks.

In a recent attack, Akira attempted to deploy ransomware on a Windows server using a password-protected zip file. However, the Endpoint Detection and Response (EDR) tool detected and quarantined the file, foiling the initial infiltration attempt. Undeterred, Akira pivoted its strategy by conducting an internal network scan to identify vulnerable devices.

During the scan, Akira unearthed various Internet of Things (IoT) devices, including webcams and a fingerprint scanner. The group honed in on a webcam due to its critical vulnerabilities, lightweight Linux operating system, and lack of EDR protection. With limited storage capacity that made it unlikely to support EDR tools, the webcam became a prime target for exploitation.

By compromising the webcam, Akira successfully deployed its Linux-based ransomware, leveraging the device’s remote shell capabilities and unmonitored status to encrypt files across the victim’s network. This incident underscored the importance of robust security practices, emphasizing the need for organizations to prioritize patching and managing IoT devices, conducting regular vulnerability audits, and implementing network segmentation.

Researchers have highlighted the significance of monitoring network traffic from IoT devices for anomalies, as even seemingly inconsequential devices can serve as critical entry points for threat actors. Implementing a comprehensive security approach that encompasses all network-connected devices is paramount in safeguarding against evolving ransomware threats like Akira.

To bolster defenses against such sophisticated attacks, organizations are advised to stay informed about the latest malware and phishing threats. By collecting threat intelligence and leveraging tools like ANY.RUN TI Lookup, organizations can proactively identify and mitigate potential risks. Overall, remaining vigilant and proactive in cybersecurity measures is crucial in the face of ever-evolving threats posed by ransomware groups like Akira.

Source link

Latest articles

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...

Why IT Leaders Must Rethink Backup in the Age of Ransomware

 With IT outages and disruptions escalating, IT teams are shifting their focus beyond...

More like this

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...