The Akira ransomware group, a well-established cyber threat actor, has recently employed an innovative attack vector to circumvent security defenses. In a 2024 incident, Akira was responsible for 15% of ransomware cases investigated by cybersecurity firm S-RM. In this particular case, the attackers bypassed an organization’s Endpoint Detection and Response (EDR) system by leveraging an unsecured Internet of Things (IoT) device—a webcam—on the victim’s network. This highlights a growing trend of adversaries exploiting non-traditional entry points, such as IoT devices, to execute their malicious operations undetected.
1. Initial Compromise:
2. Blocked by EDR & Pivot to IoT:
3. Webcam Exploitation & Ransomware Deployment:
4. Impact & Consequences
This attack underscores the urgent need for better IoT security measures, proactive network segmentation, and continuous monitoring of all network-connected devices.
Source:
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy