Skip to main content

Observed Malicious Driver Use Associated with Akira SonicWall Campaign

Medium
Published: Fri Aug 08 2025 (08/08/2025, 08:07:28 UTC)
Source: AlienVault OTX General

Description

Akira affiliates have been observed exploiting two common drivers as part of a suspected AV/EDR evasion effort following initial access involving SonicWall abuse. The drivers, rwdrv.sys and hlpdrv.sys, are being used to facilitate AV/EDR evasion or disablement through a Bring Your Own Vulnerable Driver (BYOVD) exploitation chain. This behavior has been prevalent in recent Akira ransomware incident response cases. The campaign may be driven by an unreported zero-day vulnerability in SonicWall VPNs. Defenders are advised to harden SonicWall VPNs, implement recommended mitigations, and use provided YARA rules for detection and response to pre-ransomware activity.

AI-Powered Analysis

AILast updated: 08/08/2025, 08:32:50 UTC

Technical Analysis

The observed threat involves the Akira ransomware affiliates exploiting vulnerabilities related to SonicWall VPN appliances to gain initial access into targeted networks. Following this initial compromise, the attackers employ a Bring Your Own Vulnerable Driver (BYOVD) technique by leveraging two common Windows drivers, rwdrv.sys and hlpdrv.sys. These drivers are legitimate but vulnerable, and their exploitation allows the attackers to evade or disable antivirus (AV) and endpoint detection and response (EDR) solutions. This evasion is critical for the attackers to maintain persistence and avoid detection during the pre-ransomware activity phase. The campaign is suspected to be driven by an unreported zero-day vulnerability in SonicWall VPNs, which are widely used for secure remote access. The use of BYOVD is a sophisticated tactic that involves loading vulnerable drivers to execute malicious code with kernel-level privileges, effectively bypassing security controls. The campaign has been linked to multiple recent Akira ransomware incident response cases, indicating an ongoing and active threat. Defenders are advised to harden SonicWall VPN configurations, apply any recommended mitigations, and utilize YARA detection rules provided by threat intelligence sources to identify and respond to this activity before ransomware deployment. The attack techniques correspond to MITRE ATT&CK tactics such as initial access (T1078), privilege escalation (T1068), persistence (T1547.006), defense evasion (T1562.001), and user execution (T1204.002). No public CVE or patch is currently available, and no known exploits in the wild have been confirmed, but the threat is active and evolving.

Potential Impact

For European organizations, the impact of this threat is significant due to the widespread use of SonicWall VPNs in corporate and governmental environments for secure remote access. Successful exploitation can lead to unauthorized network access, enabling attackers to bypass AV/EDR protections and deploy ransomware payloads, resulting in data encryption, operational disruption, and potential data breaches. This can affect confidentiality, integrity, and availability of critical systems. The use of vulnerable drivers for AV/EDR evasion complicates detection and response efforts, increasing dwell time and the likelihood of successful ransomware deployment. Organizations in sectors with high reliance on SonicWall VPNs, such as finance, healthcare, manufacturing, and public administration, face elevated risks. Additionally, the presence of a zero-day vulnerability means traditional patching and signature-based defenses may be ineffective, requiring proactive threat hunting and monitoring. The ransomware nature of the Akira campaign also implies potential financial losses, reputational damage, and regulatory consequences under GDPR and other data protection laws if personal or sensitive data is compromised or unavailable.

Mitigation Recommendations

European organizations should immediately review and harden SonicWall VPN configurations by disabling unnecessary services, enforcing strong authentication mechanisms (e.g., multi-factor authentication), and restricting VPN access to trusted IP ranges. Network segmentation should be implemented to limit lateral movement in case of compromise. Deploy advanced endpoint protection solutions capable of detecting BYOVD techniques and monitor for the presence or loading of the rwdrv.sys and hlpdrv.sys drivers, especially if they are unsigned or modified. Utilize the provided YARA rules from threat intelligence sources to detect malicious driver usage and pre-ransomware activity. Conduct regular threat hunting exercises focusing on kernel-level anomalies and unusual driver loads. Maintain comprehensive logging and monitoring of VPN access and endpoint behavior. Since no patch is currently available for the suspected zero-day, organizations should engage with SonicWall support for any interim mitigations or advisories. Incident response plans should be updated to include scenarios involving BYOVD and ransomware, ensuring rapid containment and recovery. User training to recognize phishing or social engineering attempts that may lead to initial access is also critical.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.guidepointsecurity.com/blog/gritrep-akira-sonicwall/"]
Adversary
Akira
Pulse Id
6895b04096ab14debd24e809
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashbd1f381e5a3db22e88776b7873d4d2835e9a1ec620571d2b1da0c58f81c84a56
hash6bc8e3505d9f51368ddf323acb6abc49
MD5 of 16f83f056177c4ec24c7e99d01ca9d9d6713bd0497eeedb777a3ffefa99c97f0
hash82ed942a52cdcf120a8919730e00ba37619661a3
SHA1 of 16f83f056177c4ec24c7e99d01ca9d9d6713bd0497eeedb777a3ffefa99c97f0
hash16f83f056177c4ec24c7e99d01ca9d9d6713bd0497eeedb777a3ffefa99c97f0

Threat ID: 6895b2abad5a09ad00019ae7

Added to database: 8/8/2025, 8:17:47 AM

Last enriched: 8/8/2025, 8:32:50 AM

Last updated: 8/9/2025, 10:07:15 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats