Pietro Melillo : 7 March 2025 17:02
Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed by the S-RM team highlighted how this group leveraged an unprotected webcam to deploy its payload, evading the defenses of an Endpoint Detection and Response (EDR) system.
The attack began with the compromise of the victim’s network through an internet-exposed remote access solution. Once inside, Akira deployed AnyDesk.exe, a remote management tool, to maintain control over the environment and proceed with data exfiltration.
During the later stages of the attack, the attackers used the Remote Desktop Protocol (RDP) to move laterally within the network. They then attempted to deploy the ransomware on a Windows server by sending a password-protected ZIP file containing the malicious executable. However, the organization’s EDR detected and blocked the threat before it could be executed.
Iscriviti GRATIS alla RHC Conference 2025 (Venerdì 9 maggio 2025)
Il giorno Venerdì 9 maggio 2025 presso il teatro Italia di Roma (a due passi dalla stazione termini e dalla metro B di Piazza Bologna), si terrà
la RHC Conference 2025. Si tratta dell’appuntamento annuale gratuito, creato dalla community di RHC, per far accrescere l’interesse verso le tecnologie digitali, l’innovazione digitale e la consapevolezza del rischio informatico.
La giornata inizierà alle 9:30 (con accoglienza dalle 9:00) e sarà interamente dedicata alla RHC Conference, un evento di spicco nel campo della sicurezza informatica. Il programma prevede un panel con ospiti istituzionali che si terrà all’inizio della conferenza. Successivamente, numerosi interventi di esperti nazionali nel campo della sicurezza informatica si susseguiranno sul palco fino alle ore 19:00 circa, quando termineranno le sessioni. Prima del termine della conferenza, ci sarà la premiazione dei vincitori della Capture The Flag prevista per le ore 18:00.
Potete iscrivervi gratuitamente all'evento utilizzando questo link.
Per ulteriori informazioni, scrivi a [email protected] oppure su Whatsapp al 379 163 8765
Supporta RHC attraverso:
Ti piacciono gli articoli di Red Hot Cyber? Non aspettare oltre, iscriviti alla newsletter settimanale per non perdere nessun articolo.
After realizing that the EDR was preventing the ransomware from spreading, the attackers changed their strategy. An internal network scan revealed the presence of vulnerable IoT devices, including webcams and biometric scanners. Specifically, a webcam was exposed with the following critical issues:
The attackers used the compromised webcam as an entry point to deploy the ransomware across the victim’s network. The Server Message Block (SMB) traffic generated by the device to transmit the payload went unnoticed, allowing Akira to successfully encrypt files across enterprise systems.
The incident highlighted three crucial aspects of cybersecurity:
To mitigate similar threats, organizations should adopt the following measures:
The Akira case demonstrates how threat actors can bypass traditional security measures by exploiting overlooked weak points, such as IoT devices. A comprehensive security strategy that includes network segmentation, continuous monitoring, and regular updates is essential to reducing the risk of such attacks.