Akira Ransomware Exploits RDP to Attack Windows Servers and Bypass EDR Using Webcam

In a recent cybersecurity incident, the Akira ransomware group demonstrated its evolving tactics by exploiting Remote Desktop Protocol (RDP) to target Windows servers and leveraging an unsecured webcam to bypass Endpoint Detection and Response (EDR) tools.

This sophisticated attack highlights the group’s ability to adapt and innovate in evading security measures.

Initial Attack Vector: RDP and EDR Evasion

Akira initially compromised the victim’s network through an externally facing remote access solution, deploying AnyDesk.exe to maintain network access.

The group then exfiltrated data and attempted to deploy ransomware on a Windows server via RDP.

However, the EDR tool detected and quarantined the ransomware binary, prompting Akira to pivot its strategy.

The attackers conducted an internal network scan, identifying several Internet of Things (IoT) devices, including webcams and a fingerprint scanner.

Akira Ransomware
Akira ransomware IoT attack chain

According to the researchers, these devices presented an opportunity for Akira to bypass the EDR tool.

Exploiting IoT Devices: The Webcam Compromise

Akira targeted an unsecured webcam due to its vulnerabilities, including remote shell capabilities and unauthorized remote viewing.

The webcam ran a lightweight Linux operating system, supporting command execution similar to a standard Linux device, making it suitable for Akira’s Linux ransomware variant.

Critically, the webcam lacked EDR protection, largely due to its limited storage capacity.

Akira quickly deployed its Linux-based ransomware from the compromised webcam, using the Server Message Block (SMB) protocol to encrypt files across the victim’s network.

This approach allowed the attackers to remain undetected by the victim’s security team, as the malicious SMB traffic from the webcam did not trigger any alerts.

This incident underscores the importance of comprehensive security practices.

Organizations should prioritize patching and managing IoT devices, regularly auditing internal networks for vulnerabilities, and implementing network segmentation to restrict IoT device communication.

Additionally, keeping IoT devices powered off when not in use can prevent similar attacks.

The Akira ransomware group’s adaptability highlights the need for continuous monitoring and robust security measures to protect against evolving threats.

As ransomware-as-a-service (RaaS) continues to evolve, organizations must remain vigilant and proactive in their cybersecurity strategies.

Also Read:

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here