Qilin Ransomware, the new RaaS?
For immediate assistance with a network intrusion, ransomwareattack, or BEC, please contact: IrongateResponse@irongatesecurity.com
IronGate has observed a marked rise in Akira ransomware incidents across multiple industries, echoing recent public reporting. Adversaries are actively exploiting SonicWall SSL VPN vulnerabilities, most notably CVE-2024-40766, to gain initial access. Their campaigns align with Akira’s well-documented tactics: credential compromise, double extortion, and multi-platform ransomware deployment.
Attack Lifecycle
ExClop campaigns reveal a deep understanding of Microsoft’s cloud ecosystem, employing multiple techniques in parallel:
Initial Access
Persistence & Privilege Escalation
Lateral Movement & Discovery
Exfiltration & Impact
Observed Attack Flow
References
Contact us today to learn more about our Digital Forensics and Incident Response (DFIR) services.
![]() |
Steve Ramey has spent the past two decades helping clients protect, investigate, and respond to events involving their digital interests. |
For immediate assistance with a network intrusion, ransomwareattack, or BEC, please contact: IrongateResponse@irongatesecurity.com
Recommended Security Controls For immediate assistance with a network intrusion, ransomwareattack, or BEC, please contact: ...
For immediate assistance with a network intrusion, ransomwareattack, or BEC, please contact: IrongateResponse@irongatesecurity.com