Contact

Observed Malicious Driver Use Associated with Akira SonicWall Campaign

NetmanageIT OpenCTI - opencti.netmanageit.com

Observed Malicious Driver Use Associated with Akira SonicWall Campaign



SUMMARY :

Akira affiliates have been observed exploiting two common drivers as part of a suspected AV/EDR evasion effort following initial access involving SonicWall abuse. The drivers, rwdrv.sys and hlpdrv.sys, are being used to facilitate AV/EDR evasion or disablement through a Bring Your Own Vulnerable Driver (BYOVD) exploitation chain. This behavior has been prevalent in recent Akira ransomware incident response cases. The campaign may be driven by an unreported zero-day vulnerability in SonicWall VPNs. Defenders are advised to harden SonicWall VPNs, implement recommended mitigations, and use provided YARA rules for detection and response to pre-ransomware activity.

OPENCTI LABELS :

vpn,ransomware,zero-day,byovd,akira,drivers,sonicwall,av/edr evasion


Open in NetmanageIT OpenCTI Public Instance with below link!


Use public read only username and password on login page.

NOTE : Use Public READ only user credentials on login page banner.


Observed Malicious Driver Use Associated with Akira SonicWall Campaign