CISA: Akira Ransomware Cybersecurity Advisory


Userlevel 7
Badge +7
  • Veeam Legend
  • 716 comments

Hi Everyone, 

CISA recently published a Cybersecurity Advisory for Akira Ransomware:

The Threat Actors are gaining access to vulnerable environments via VPN which do not have multifactor authentication enabled, using known Cisco vulnerabilities, internet facing RDP access, spear phishing and valid credential abuse. 

However, what is most interesting is that they are also going after Veeam Backup Servers and have created their own scripts:


Ensure:

  • MFA is enabled
  • Segment networks
  • Patch often
  • Review and audit user accounts
  • Have offline and offsite backups

5 comments

Userlevel 7
Badge +20

Wow this is great to know.  We have security for our environments but I am also working on domain segregation with a new forest based on best practices for our Veeam.  They will soon have their own domain which will be locked down tight.  Thanks for sharing this one Dipen.

Userlevel 7
Badge +7

Shows how important backups are @Chris.Childerhose 

Seems they are beginning to focus a lot more on backup servers. 

Userlevel 7
Badge +17

Thanks for the heads up Dipen! 👍🏻

Userlevel 7
Badge +2

Oh wow, thank you for the sharing @dips ,
Veeam is now targeted since it is the market leader of the backup software.

 

Standing at the peak of the mountain, you become visible to all and the wind blows harder

Userlevel 7
Badge +7

Oh wow, thank you for the sharing @dips ,
Veeam is now targeted since it is the market leader of the backup software.

 

Standing at the peak of the mountain, you become visible to all and the wind blows harder

I reckon we will see more targeted attacks against Veeam infrastructure in the environment with the way things are going. 

Comment