Observed Malicious Driver Use Associated with Akira SonicWall Campaign
Akira affiliates have been observed exploiting two common drivers as part of a suspected AV/EDR evasion effort following initial access involving SonicWall abuse. The drivers, rwdrv.sys and hlpdrv.sys, are being used to facilitate AV/EDR evasion or disablement through a Bring Your Own Vulnerable Driver (BYOVD) exploitation chain. This behavior has been prevalent in recent Akira ransomware incident response cases. The campaign may be driven by an unreported zero-day vulnerability in SonicWall VPNs. Defenders are advised to harden SonicWall VPNs, implement recommended mitigations, and use provided YARA rules for detection and response to pre-ransomware activity.
AI Analysis
Technical Summary
The observed threat involves the Akira ransomware affiliates exploiting vulnerabilities related to SonicWall VPN appliances to gain initial access into targeted networks. Following this initial compromise, the attackers employ a Bring Your Own Vulnerable Driver (BYOVD) technique by leveraging two common Windows drivers, rwdrv.sys and hlpdrv.sys. These drivers are legitimate but vulnerable, and their exploitation allows the attackers to evade or disable antivirus (AV) and endpoint detection and response (EDR) solutions. This evasion is critical for the attackers to maintain persistence and avoid detection during the pre-ransomware activity phase. The campaign is suspected to be driven by an unreported zero-day vulnerability in SonicWall VPNs, which are widely used for secure remote access. The use of BYOVD is a sophisticated tactic that involves loading vulnerable drivers to execute malicious code with kernel-level privileges, effectively bypassing security controls. The campaign has been linked to multiple recent Akira ransomware incident response cases, indicating an ongoing and active threat. Defenders are advised to harden SonicWall VPN configurations, apply any recommended mitigations, and utilize YARA detection rules provided by threat intelligence sources to identify and respond to this activity before ransomware deployment. The attack techniques correspond to MITRE ATT&CK tactics such as initial access (T1078), privilege escalation (T1068), persistence (T1547.006), defense evasion (T1562.001), and user execution (T1204.002). No public CVE or patch is currently available, and no known exploits in the wild have been confirmed, but the threat is active and evolving.
Potential Impact
For European organizations, the impact of this threat is significant due to the widespread use of SonicWall VPNs in corporate and governmental environments for secure remote access. Successful exploitation can lead to unauthorized network access, enabling attackers to bypass AV/EDR protections and deploy ransomware payloads, resulting in data encryption, operational disruption, and potential data breaches. This can affect confidentiality, integrity, and availability of critical systems. The use of vulnerable drivers for AV/EDR evasion complicates detection and response efforts, increasing dwell time and the likelihood of successful ransomware deployment. Organizations in sectors with high reliance on SonicWall VPNs, such as finance, healthcare, manufacturing, and public administration, face elevated risks. Additionally, the presence of a zero-day vulnerability means traditional patching and signature-based defenses may be ineffective, requiring proactive threat hunting and monitoring. The ransomware nature of the Akira campaign also implies potential financial losses, reputational damage, and regulatory consequences under GDPR and other data protection laws if personal or sensitive data is compromised or unavailable.
Mitigation Recommendations
European organizations should immediately review and harden SonicWall VPN configurations by disabling unnecessary services, enforcing strong authentication mechanisms (e.g., multi-factor authentication), and restricting VPN access to trusted IP ranges. Network segmentation should be implemented to limit lateral movement in case of compromise. Deploy advanced endpoint protection solutions capable of detecting BYOVD techniques and monitor for the presence or loading of the rwdrv.sys and hlpdrv.sys drivers, especially if they are unsigned or modified. Utilize the provided YARA rules from threat intelligence sources to detect malicious driver usage and pre-ransomware activity. Conduct regular threat hunting exercises focusing on kernel-level anomalies and unusual driver loads. Maintain comprehensive logging and monitoring of VPN access and endpoint behavior. Since no patch is currently available for the suspected zero-day, organizations should engage with SonicWall support for any interim mitigations or advisories. Incident response plans should be updated to include scenarios involving BYOVD and ransomware, ensuring rapid containment and recovery. User training to recognize phishing or social engineering attempts that may lead to initial access is also critical.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Switzerland
Indicators of Compromise
- hash: bd1f381e5a3db22e88776b7873d4d2835e9a1ec620571d2b1da0c58f81c84a56
- hash: 6bc8e3505d9f51368ddf323acb6abc49
- hash: 82ed942a52cdcf120a8919730e00ba37619661a3
- hash: 16f83f056177c4ec24c7e99d01ca9d9d6713bd0497eeedb777a3ffefa99c97f0
Observed Malicious Driver Use Associated with Akira SonicWall Campaign
Description
Akira affiliates have been observed exploiting two common drivers as part of a suspected AV/EDR evasion effort following initial access involving SonicWall abuse. The drivers, rwdrv.sys and hlpdrv.sys, are being used to facilitate AV/EDR evasion or disablement through a Bring Your Own Vulnerable Driver (BYOVD) exploitation chain. This behavior has been prevalent in recent Akira ransomware incident response cases. The campaign may be driven by an unreported zero-day vulnerability in SonicWall VPNs. Defenders are advised to harden SonicWall VPNs, implement recommended mitigations, and use provided YARA rules for detection and response to pre-ransomware activity.
AI-Powered Analysis
Technical Analysis
The observed threat involves the Akira ransomware affiliates exploiting vulnerabilities related to SonicWall VPN appliances to gain initial access into targeted networks. Following this initial compromise, the attackers employ a Bring Your Own Vulnerable Driver (BYOVD) technique by leveraging two common Windows drivers, rwdrv.sys and hlpdrv.sys. These drivers are legitimate but vulnerable, and their exploitation allows the attackers to evade or disable antivirus (AV) and endpoint detection and response (EDR) solutions. This evasion is critical for the attackers to maintain persistence and avoid detection during the pre-ransomware activity phase. The campaign is suspected to be driven by an unreported zero-day vulnerability in SonicWall VPNs, which are widely used for secure remote access. The use of BYOVD is a sophisticated tactic that involves loading vulnerable drivers to execute malicious code with kernel-level privileges, effectively bypassing security controls. The campaign has been linked to multiple recent Akira ransomware incident response cases, indicating an ongoing and active threat. Defenders are advised to harden SonicWall VPN configurations, apply any recommended mitigations, and utilize YARA detection rules provided by threat intelligence sources to identify and respond to this activity before ransomware deployment. The attack techniques correspond to MITRE ATT&CK tactics such as initial access (T1078), privilege escalation (T1068), persistence (T1547.006), defense evasion (T1562.001), and user execution (T1204.002). No public CVE or patch is currently available, and no known exploits in the wild have been confirmed, but the threat is active and evolving.
Potential Impact
For European organizations, the impact of this threat is significant due to the widespread use of SonicWall VPNs in corporate and governmental environments for secure remote access. Successful exploitation can lead to unauthorized network access, enabling attackers to bypass AV/EDR protections and deploy ransomware payloads, resulting in data encryption, operational disruption, and potential data breaches. This can affect confidentiality, integrity, and availability of critical systems. The use of vulnerable drivers for AV/EDR evasion complicates detection and response efforts, increasing dwell time and the likelihood of successful ransomware deployment. Organizations in sectors with high reliance on SonicWall VPNs, such as finance, healthcare, manufacturing, and public administration, face elevated risks. Additionally, the presence of a zero-day vulnerability means traditional patching and signature-based defenses may be ineffective, requiring proactive threat hunting and monitoring. The ransomware nature of the Akira campaign also implies potential financial losses, reputational damage, and regulatory consequences under GDPR and other data protection laws if personal or sensitive data is compromised or unavailable.
Mitigation Recommendations
European organizations should immediately review and harden SonicWall VPN configurations by disabling unnecessary services, enforcing strong authentication mechanisms (e.g., multi-factor authentication), and restricting VPN access to trusted IP ranges. Network segmentation should be implemented to limit lateral movement in case of compromise. Deploy advanced endpoint protection solutions capable of detecting BYOVD techniques and monitor for the presence or loading of the rwdrv.sys and hlpdrv.sys drivers, especially if they are unsigned or modified. Utilize the provided YARA rules from threat intelligence sources to detect malicious driver usage and pre-ransomware activity. Conduct regular threat hunting exercises focusing on kernel-level anomalies and unusual driver loads. Maintain comprehensive logging and monitoring of VPN access and endpoint behavior. Since no patch is currently available for the suspected zero-day, organizations should engage with SonicWall support for any interim mitigations or advisories. Incident response plans should be updated to include scenarios involving BYOVD and ransomware, ensuring rapid containment and recovery. User training to recognize phishing or social engineering attempts that may lead to initial access is also critical.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.guidepointsecurity.com/blog/gritrep-akira-sonicwall/"]
- Adversary
- Akira
- Pulse Id
- 6895b04096ab14debd24e809
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hashbd1f381e5a3db22e88776b7873d4d2835e9a1ec620571d2b1da0c58f81c84a56 | — | |
hash6bc8e3505d9f51368ddf323acb6abc49 | MD5 of 16f83f056177c4ec24c7e99d01ca9d9d6713bd0497eeedb777a3ffefa99c97f0 | |
hash82ed942a52cdcf120a8919730e00ba37619661a3 | SHA1 of 16f83f056177c4ec24c7e99d01ca9d9d6713bd0497eeedb777a3ffefa99c97f0 | |
hash16f83f056177c4ec24c7e99d01ca9d9d6713bd0497eeedb777a3ffefa99c97f0 | — |
Threat ID: 6895b2abad5a09ad00019ae7
Added to database: 8/8/2025, 8:17:47 AM
Last enriched: 8/8/2025, 8:32:50 AM
Last updated: 8/9/2025, 10:07:15 AM
Views: 12
Related Threats
WinRAR zero-day exploited to plant malware on archive extraction
CriticalThreatFox IOCs for 2025-08-08
MediumPhishing Attack: Deploying Malware on Indian Defense BOSS Linux
Medium650 Attack Tools, One Coordinated Campaign
MediumUnmasking SocGholish: The Malware Web Behind the 'Pioneer of Fake Updates' and Its Operator, TA569
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.