HomeCyber BalkansCisco VPNs targeted by Akira and LockBit ransomware attacks

Cisco VPNs targeted by Akira and LockBit ransomware attacks

Published on

spot_img

Cisco VPNs are currently being targeted by ransomware actors, including the groups known as Akira and LockBit, according to a security advisory by Cisco and new research conducted by Rapid7.

On August 24, Cisco disclosed the attacks against its VPNs through an advisory written by Omar Santos, who is the principal engineer of Cisco’s Product Security Incident Response Team. Santos stated that the Akira ransomware threat actors were specifically targeting Cisco VPNs that lacked multifactor authentication (MFA) configurations.

Although the advisory did not provide many technical details, Santos mentioned that the attackers most likely gained access to the VPNs through brute-forcing or by purchasing stolen credentials from the dark web. He also pointed out that in the reported attacks, logging was not properly configured, making it difficult to determine exactly how the Akira ransomware attackers were able to access the VPNs.

Additional technical insight into these attacks was provided by Rapid7, which was credited by Cisco for assisting in the investigation. In a research report published on Tuesday, Rapid7 revealed that they had been tracking ransomware attacks against Cisco Adaptive Security Appliance (ASA) SSL VPN devices since at least March. The security vendor observed adversaries conducting credential-stuffing and brute-force attacks against organizations that did not have fully enforced MFA configurations.

Rapid7 stated that they had identified at least 11 customers who experienced intrusions related to Cisco ASA devices between March 30 and August 24, 2023. They found that the malicious activity originated from ASA appliances that were servicing SSL VPNs for remote users. Patch versions of the compromised appliances varied, indicating that there was no specific version that was more susceptible to exploitation.

Furthermore, Rapid7 reported that several of these incidents resulted in the deployment of ransomware by both the Akira and LockBit groups. Akira is a relatively new ransomware gang that was first identified in March 2023, while LockBit has been known as one of the major players in the ransomware landscape for some time.

During their investigation, Rapid7 monitored underground forums and Telegram channels for discussions related to the intrusions targeting Cisco ASA devices. Their threat intelligence teams discovered that a well-known initial access broker named “Bassterlord” was selling a guide for breaching corporate networks. Rapid7 managed to obtain a leaked copy of the guide, which included references to Cisco SSL VPNs.

Interestingly, the guide claimed that the author had compromised 4,865 Cisco SSL VPN services and 9,870 Fortinet VPN services using the username/password combination “test:test.” Rapid7 speculated that the timing of the dark web discussion and the increased threat activity they observed could be attributed to the manual’s instructions, which likely contributed to the rise in brute-force attacks targeting Cisco ASA VPNs.

TechTarget Editorial has reached out to Cisco for additional comments on the matter.

In conclusion, Cisco VPNs are currently under attack by ransomware actors, with the Akira and LockBit groups being the primary culprits. The attacks exploit VPNs that lack proper multifactor authentication and involve methods such as brute-forcing and purchasing stolen credentials. Rapid7’s research provides valuable insights into the nature of these attacks, including the involvement of a well-known initial access broker and the use of leaked guides to compromise corporate networks. As the situation continues to unfold, it is crucial for organizations to ensure the security of their VPNs and implement strong authentication measures to protect against these threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...