Pietro Melillo : 7 March 2025 17:02
Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed by the S-RM team highlighted how this group leveraged an unprotected webcam to deploy its payload, evading the defenses of an Endpoint Detection and Response (EDR) system.
The attack began with the compromise of the victim’s network through an internet-exposed remote access solution. Once inside, Akira deployed AnyDesk.exe, a remote management tool, to maintain control over the environment and proceed with data exfiltration.
During the later stages of the attack, the attackers used the Remote Desktop Protocol (RDP) to move laterally within the network. They then attempted to deploy the ransomware on a Windows server by sending a password-protected ZIP file containing the malicious executable. However, the organization’s EDR detected and blocked the threat before it could be executed.
Vorresti toccare con mano la Cybersecurity e la tecnologia? Iscriviti GRATIS ai WorkShop Hands-On della RHC Conference 2025 (Giovedì 8 maggio 2025)
Se sei un ragazzo delle scuole medie, superiori o frequenti l'università, oppure banalmente un curioso di qualsiasi età, il giorno giovedì 8 maggio 2025 presso il teatro Italia di Roma (a due passi dalla stazione termini e dalla metro B di Piazza Bologna), si terranno i workshop "hands-on", creati per far avvicinare i ragazzi alla sicurezza informatica e alla tecnologia. Questo anno i workshop saranno:
Supporta RHC attraverso:
Ti piacciono gli articoli di Red Hot Cyber? Non aspettare oltre, iscriviti alla newsletter settimanale per non perdere nessun articolo.
After realizing that the EDR was preventing the ransomware from spreading, the attackers changed their strategy. An internal network scan revealed the presence of vulnerable IoT devices, including webcams and biometric scanners. Specifically, a webcam was exposed with the following critical issues:
The attackers used the compromised webcam as an entry point to deploy the ransomware across the victim’s network. The Server Message Block (SMB) traffic generated by the device to transmit the payload went unnoticed, allowing Akira to successfully encrypt files across enterprise systems.
The incident highlighted three crucial aspects of cybersecurity:
To mitigate similar threats, organizations should adopt the following measures:
The Akira case demonstrates how threat actors can bypass traditional security measures by exploiting overlooked weak points, such as IoT devices. A comprehensive security strategy that includes network segmentation, continuous monitoring, and regular updates is essential to reducing the risk of such attacks.