• Home
  • Services
    • HPA – Zero Trust Access
    • SASE / CASB
    • Security Consultation
    • Software Development
  • Company
    • About Us
    • Contact Us
    • FAQ
    • Terms of Use
    • Privacy Policy
  • Blog
hyper-ict.com hyper-ict.com
  • Home
  • Services
    • HPA
    • SASE / CASB
    • Security Consultation
    • Software Development
  • Company
    • About us
    • hpa-request-demo
    • FAQ
    • Terms of Use
    • Privacy Policy
  • Blog
hyper-ict.com

Akira

Home / Akira
20Feb

Protect Your Network from Akira Ransomware Targeting Cisco ASA Vulnerabilities

February 20, 2024 manager Security, VPN 82

Intoduction

Organizations need to stay vigilant to protect their valuable data and systems. One recent concern is the Akira ransomware targeting Cisco ASA VPN vulnerabilities, particularly CVE-2020-3259. This blog post dives deep into this issue, explaining the risks, vulnerabilities involved, and crucial mitigation steps recommended by the U.S. Cybersecurity and Infrastructure Security Agency (CISA).

Understanding Akira Ransomware and Its Tactics

Akira ransomware emerged in March 2023 and has since targeted various industries, including education, finance, and real estate. This malware encrypts critical data, rendering it inaccessible until a ransom is paid. The attackers behind Akira are particularly known for exploiting vulnerabilities in Cisco ASA and FTD VPN appliances to gain initial access to networks.

CVE-2020-3259: The Exploited Vulnerability in Cisco ASA and FTD

The vulnerability exploited by Akira, CVE-2020-3259, is an information disclosure issue found in Cisco ASA and FTD web services. It allows attackers to access sensitive information, potentially including credentials and configuration details, that can be used to further compromise the network. This vulnerability received a CVSS score of 7.5, indicating a high severity risk.

CISA Sounds the Alarm: Urgent Action Required

Recognizing the potential impact of this attack vector, CISA issued an advisory on February 16, 2024, urging organizations to take immediate action. The advisory highlights the following key points:

  • Akira ransomware is actively exploiting CVE-2020-3259 in real-world attacks.
  • Organizations using vulnerable Cisco ASA and FTD devices are at significant risk.
  • Immediate patching of CVE-2020-3259 is crucial to mitigate the risk of compromise.

CISA also provides additional recommendations for improving overall network security, including:

  • Enforcing multi-factor authentication (MFA) for all VPN users.
  • Segmenting your network to limit the potential impact of an attack.
  • Regularly backing up your critical data.
  • Implementing a comprehensive security awareness program for your employees.

Taking Action to Protect Your Network

It’s imperative for organizations to heed CISA’s warnings and take proactive steps to address the vulnerabilities exploited by Akira ransomware. Here’s what you should do:

  1. Verify your Cisco ASA and FTD software version: Determine if your devices are running versions affected by CVE-2020-3259. You can find this information in the device configuration or by contacting Cisco support.
  2. Apply patches immediately: If your devices are vulnerable, download and apply the latest security patches from Cisco as soon as possible. Do not delay patching, as even a brief window of vulnerability can be exploited by attackers.
  3. Enable additional security measures: Implement CISA’s recommendations for MFA, network segmentation, data backups, and employee security awareness training. These measures significantly strengthen your defenses against various cyber threats, not just Akira ransomware.
  4. Stay informed: Regularly monitor security advisories from CISA and other reputable sources to stay updated on emerging threats and vulnerabilities.

Conclusion

By understanding the risks posed by Akira ransomware and the vulnerabilities it exploits, organizations can take informed actions to protect their networks. Remember, proactive security measures are far more effective and less costly than recovering from a ransomware attack. Take action today to safeguard your data and critical infrastructure.

Additional Resources:

Hyper ICT website, CISA Alert, Cisco Website.

Read more

Get in Touch with Us!

Have questions or need assistance? We're here to help!

Address: Soukankari11, 2360, Espoo, Finland

Email: info [at] hyper-ict [dot] com

Phone: +358 415733138

Join Linkedin
logo

Hyper ICT is a Finnish company specializing in network security, IT infrastructure, and digital solutions. We help businesses stay secure and connected with Zero Trust Access, network management, and consulting services tailored to their needs.

    Services

    HPA – Zero Trust Access
    Security Consultation

    Software Development
    IPv4 Address Leasing

    Quick Menu

    About us
    Contact Us
    Terms of use
    Privacy policy
    FAQ
    Blog

    Certificate

    sinivalkoinen HPA ztna

    © 2023-2025 Hyper ICT Oy All rights reserved.

    WhatsApp us