TL;DR: Akira ransomware affiliates are exploiting SonicWall SSL VPN appliances to break into North Carolina small businesses and encrypt entire networks in under four hours, sometimes as little as 55 minutes from initial access to ransom note. According to the At-Bay 2026 InsurSec Report, 86% of confirmed Akira breaches in 2025 involved a SonicWall device, and SonicWall-related claims now account for roughly 40% of all ransomware insurance claims. Average Akira ransom demand: $1.2 million. The fix: patch CVE-2024-40766, enforce MFA on every VPN login, deploy modern EDR with 24/7 SOC, and retire end-of-life firewalls.
Key takeaway: Owning a SonicWall is not the problem. Running an unpatched or end-of-life SonicWall with no MFA and no behavioral endpoint detection is. NC small businesses can defend against Akira in days, not months, if they prioritize the right four controls.
Worried your firewall is the next Akira target? Preferred Data Corporation runs a 30-minute SonicWall and VPN exposure check for North Carolina businesses. Call (336) 886-3282 or request a firewall security review. Serving NC since 1987.
What is happening with Akira ransomware in 2025-2026?
Akira is one of 85 active ransomware-as-a-service (RaaS) groups identified by Chainalysis in its 2026 Crypto Crime Report, but it has emerged as the single most economically damaging group for US small and mid-sized businesses. The group operates an affiliate model: core developers maintain the malware while affiliates (independent threat actors) execute intrusions and split ransom proceeds.
Throughout 2025 and into 2026, Akira affiliates have concentrated on a single, repeatable attack chain:
- Scan the public internet for SonicWall SSL VPN appliances
- Exploit unpatched SonicWall vulnerabilities, primarily CVE-2024-40766 (an improper access control flaw in SonicOS Gen 5, Gen 6, and Gen 7)
- Authenticate to the VPN, often using credentials harvested before the device was patched
- Move laterally, disable EDR, exfiltrate data, deploy Akira ransomware
- Demand payment via Tor leak site
Arctic Wolf's threat research team named the campaign "Smash and Grab" because the entire chain often completes in under four hours, with one observed intrusion encrypting a victim's network just 55 minutes after the affiliate first authenticated to the VPN.
How bad is the Akira-SonicWall problem for small businesses?
The numbers reported by At-Bay's 2026 InsurSec Report, Bitsight, Rapid7, and ReliaQuest tell a consistent story:
| Metric | 2025-2026 value |
|---|---|
| Share of ransomware insurance claims tied to compromised VPN appliances | ~74% |
| Share of those involving SonicWall specifically | 86% |
| Average Akira ransom demand | $1.2 million |
| YoY increase in cyber claim severity (businesses under $25M revenue) | +40% |
| Median time from VPN access to encryption | <4 hours |
| Fastest observed intrusion-to-encryption | 55 minutes |
| Akira active extortion group rank | Top 5 globally |
Combined with Chainalysis's finding that ransomware attacks rose roughly 50% year over year and that 88% of attacks in 2025 hit small businesses, the Akira-SonicWall pairing is the single highest-probability ransomware scenario facing a North Carolina small business in 2026.
Why are NC small and mid-sized businesses such ripe targets?
SonicWall has been a popular SMB firewall in North Carolina for over two decades. The Piedmont Triad and Research Triangle are home to thousands of manufacturers, accounting firms, healthcare practices, construction companies, and law offices that purchased SonicWall NSA, TZ, or SMA appliances during the late-2010s remote-work expansion. Many of those devices:
- Are running SonicOS firmware several versions behind current
- Were never reconfigured for MFA on SSL VPN
- Have local user accounts created in 2020-2021 that have never had credentials rotated
- Have reached vendor end-of-life and no longer receive security updates
Akira affiliates are not running sophisticated zero-days against these targets. They are running mass internet scans, finding the unpatched and EOL devices, and walking in through the front door. As Darktrace observed, "old SonicWall vulnerabilities" are doing the bulk of the damage.
For defense supply chain manufacturers in NC, an Akira intrusion can also trigger CMMC noncompliance, contract loss, and SPRS score downgrades, multiplying the financial impact far beyond the ransom itself.
What is CVE-2024-40766 and why does it matter so much?
CVE-2024-40766 is an improper access control vulnerability in SonicOS that affects SonicWall Gen 5, Gen 6, and Gen 7 firewalls running SonicOS version 7.0.1-5035 and earlier. The flaw allows unauthorized resource access and, under certain conditions, can crash the firewall or be combined with other techniques to gain administrative access.
SonicWall published patches in August 2024. The problem is that:
- A large percentage of SMB SonicWall deployments are managed by the customer or by a small reseller without patch management
- Many devices that received the firmware patch did not also reset local user passwords (which is required because credentials may have been exposed pre-patch)
- A subset of devices have reached end-of-life and cannot receive the patched firmware at all
CISA added CVE-2024-40766 to its Known Exploited Vulnerabilities Catalog in late 2024, requiring federal agencies to remediate. Akira affiliates have continued to find unpatched devices in the SMB market well into 2026.
How can NC small businesses defend against Akira-SonicWall attacks?
Defense capsule: Patch CVE-2024-40766, force-reset every local SonicWall user password, enforce MFA on SSL VPN, replace end-of-life SonicWall hardware, deploy modern EDR with 24/7 SOC monitoring, and rehearse a ransomware tabletop within 60 days.
1. Apply SonicWall patches and reset all local passwords today
The August 2024 SonicWall advisory specifies both firmware update and credential rotation. Many NC businesses applied one and not the other. If your SonicWall ran any vulnerable SonicOS version at any point, treat every local user password as compromised:
- Update firmware to the latest stable version for your generation (Gen 6 and Gen 7 are still supported; Gen 5 is end-of-life)
- Force a password reset on every local admin and SSL VPN user
- Audit local user accounts and disable any unused accounts
- Disable any default or service accounts that are not in active use
2. Enforce MFA on every SSL VPN login
CISA, the FBI, and SonicWall all explicitly recommend MFA on remote access. According to Microsoft Entra research, MFA blocks 99.9% of automated credential attacks, the exact attack class Akira affiliates run.
Modern SonicWall appliances support TOTP, SAML, and integration with Microsoft Entra ID, Duo, and Okta. There is no legitimate technical reason for an internet-facing SSL VPN to allow password-only login in 2026.
3. Replace end-of-life SonicWall hardware
If your appliance is on the SonicWall end-of-life list, no firmware patch will save you. Replace it now. With tariff-driven hardware costs up 14-18%, the temptation is to defer. Don't. The median Akira ransom demand of $1.2 million dwarfs any firewall replacement cost.
Preferred Data's managed firewall service covers procurement, installation, and ongoing patching for SonicWall, Fortinet, Cisco Meraki, Sophos, and WatchGuard.
4. Deploy modern EDR with 24/7 SOC monitoring
Even if an affiliate gets through the VPN, modern endpoint detection and response (EDR) can detect and stop the attack chain before encryption begins. Akira affiliates routinely:
- Disable Windows Defender or third-party AV (EDR detects this)
- Deploy living-off-the-land binaries like PsExec, RDP, and PowerShell (EDR detects behavioral patterns)
- Stage encryption payloads in temporary directories (EDR flags this)
- Run mass file modification (EDR can isolate the host before completion)
Crucially, EDR alone is not enough. The intrusion-to-encryption window is so short (median <4 hours) that automated alerts must be acted on within minutes by human analysts. That is why a managed 24/7 SOC service is the recommended pairing for any small business that cannot staff a security team in-house.
Preferred Data's managed cybersecurity services include EDR with 24/7 SOC oversight, integrated firewall log monitoring, and rapid response runbooks tuned for the Akira attack chain.
5. Test backups and rehearse incident response
The 28% ransomware payment rate reported by Chainalysis is driven by businesses that can recover without paying. That requires:
- Immutable, off-network backups (the 3-2-1-1-0 rule)
- Recent restore tests with documented RTO/RPO
- A written incident response plan with named decision makers
- A practiced tabletop exercise with leadership and IT
Learn more about Preferred Data's backup and disaster recovery services.
How does Akira tie into the broader 2026 threat landscape?
Akira is one expression of a much larger trend documented by CISA's AA26-113A advisory on China-nexus covert networks, BlackFog's 2026 ransomware report, and the 2026 Verizon DBIR: edge devices are the new front line. Whether the attacker is a nation-state actor staging covert infrastructure or a ransomware affiliate looking for a quick $1.2M payday, the targeted asset is the same: an unpatched, internet-facing appliance owned by a small business.
For NC manufacturers in defense supply chains, an Akira incident also creates M&A risk. ReliaQuest reports that buy-side technology due diligence routinely uncovers Akira-related compromises that depress valuations or kill deals outright.
Comparison: SonicWall configuration before vs. after Akira-resistant hardening
| Control | Vulnerable default | Akira-resistant configuration |
|---|---|---|
| Firmware version | SonicOS 7.0.1-5035 or earlier | Latest stable for generation |
| Local SSL VPN passwords | Last rotated 2020-2022 | Force-rotated post-CVE-2024-40766 |
| MFA on SSL VPN | Disabled | TOTP or SAML required |
| Hardware lifecycle | EOL Gen 5 still in production | Gen 6 or Gen 7 with vendor support |
| Default admin account | Enabled, password unchanged | Disabled or renamed with MFA |
| Outbound traffic logging | Disabled or 7-day retention | Enabled, 365+ day retention |
| EDR on endpoints | Legacy AV only | Behavioral EDR + 24/7 SOC |
| Backup architecture | Single on-prem NAS | 3-2-1-1-0 with immutable copy |
| Incident response plan | None or untested | Written, tabletop-tested annually |
What Preferred Data Corporation does to stop Akira
Preferred Data Corporation has secured North Carolina small business networks for 37+ years. Our Akira-specific defense services include:
- Firewall posture assessment: Detection of CVE-2024-40766 exposure, end-of-life hardware, missing MFA, and weak password policy across SonicWall and other vendors
- Managed firewall service: Patch deployment, configuration audit, log review, and lifecycle planning for SonicWall, Fortinet, Cisco Meraki, Sophos, and WatchGuard
- MFA rollout: Identity hardening across SSL VPN, RMM tools, RDP, and cloud admin portals
- EDR with 24/7 SOC: Behavioral endpoint detection backed by human analysts who can isolate hosts within minutes of suspicious activity
- Backup and DR: Immutable, tested backup architectures aligned to 3-2-1-1-0
- Tabletop exercises: Practiced incident response for Akira and similar fast-encryption ransomware
- CMMC and cyber insurance alignment: Documentation that your controls meet defense supply chain and underwriting requirements
Learn more about our managed cybersecurity services.
Key takeaway: Akira affiliates are running an industrialized, repeatable attack chain against unpatched SonicWalls. NC small businesses do not need a security team to defeat it. They need patches applied this week, MFA on every VPN login, EDR with human eyes, and a tested backup, work a managed security partner can complete in 30 to 60 days.
About Preferred Data Corporation
Preferred Data Corporation provides managed IT, cybersecurity, cloud solutions, and OT/IT integration for small and mid-sized businesses across the Piedmont Triad, Research Triangle, and broader North Carolina market. Headquartered in High Point, NC since 1987, with a 20+ year average client retention, BBB A+ rating, and on-site coverage within 200 miles, we are the trusted ransomware defense partner for NC manufacturers, construction firms, healthcare practices, and professional services.
Stop Akira before it stops you:
- Call (336) 886-3282
- Visit preferreddata.com/contact
- Email [email protected]
- Address: 1208 Eastchester Drive, Suite 131, High Point, NC 27265
Frequently Asked Questions
How fast can Akira encrypt my entire small business network?
According to Arctic Wolf's threat research, the median time from VPN access to encryption is under 4 hours. The fastest observed case completed in 55 minutes. That is faster than most small business owners can respond, which is why automated EDR plus a 24/7 SOC is the practical defense.
My SonicWall is patched. Am I safe from Akira?
Patching is necessary but not sufficient. SonicWall's August 2024 advisory for CVE-2024-40766 explicitly required local user password resets in addition to the firmware update because credentials may have been exposed before the patch. Many NC businesses applied the firmware but skipped the password reset. Force-rotate every local SonicWall user password and enforce MFA on SSL VPN to fully close the door.
Should I replace my SonicWall with a different vendor?
Not necessarily. Akira affiliates also exploit Fortinet, Cisco, Ivanti, and other vendor vulnerabilities. The right answer is to ensure your firewall is supported, fully patched, configured with MFA, and managed by a partner who applies updates quickly. Vendor brand matters less than operational hygiene.
What is the cost of an Akira ransomware incident for an NC small business?
Direct ransom demand averages $1.2 million per At-Bay's 2026 InsurSec Report. Indirect costs (downtime, recovery, legal, regulatory, customer churn) typically multiply that by 2-4x. According to Astra Security, the average total breach cost for SMBs is $254,445 even before factoring in mid-six-figure ransoms. By comparison, comprehensive managed security for a 50-person business runs $3,750-$8,750 per month.
Will my cyber insurance cover an Akira incident?
Most cyber insurance policies cover ransomware, but underwriters increasingly require specific controls (patched edge devices, MFA, EDR, tested backups, written IR plan) as preconditions. Failing to maintain these controls can void coverage. Work with your managed IT provider and broker to align controls to policy requirements. Read our guide on reducing cyber insurance premiums.
Is the FBI going to help me if I get hit?
The FBI welcomes ransomware reports and has occasionally provided decryption keys recovered during investigations. Reporting also gives you access to CISA resources unavailable to victims who stay silent. However, you cannot rely on federal assistance to recover quickly. Recovery without paying still depends on your own backups, EDR, and IR plan.
Related Resources
- Cybersecurity Services for NC Small Businesses
- Managed IT Services
- Backup and Disaster Recovery
- CISA China-Nexus Router/IoT Compromise Advisory
- Ransomware Recovery Plan for NC Businesses
- Ransomware Payments Drop to 28% Record Low
- EDR vs Antivirus for Manufacturers
- Reduce Cyber Insurance Premiums
- Multi-Factor Authentication Business Guide
- IT Services in Raleigh
- IT Services in Greensboro
- IT Services in Charlotte
References
- CISA. (2024). #StopRansomware: Akira Ransomware Joint Advisory (AA24-109A). https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-109a
- NVD. (2024). CVE-2024-40766 SonicWall SonicOS Improper Access Control. https://nvd.nist.gov/vuln/detail/CVE-2024-40766
- Arctic Wolf Labs. (2025-2026). Smash and Grab: Aggressive Akira Campaign Targets SonicWall VPNs. https://arcticwolf.com/resources/blog/smash-and-grab-aggressive-akira-campaign-targets-sonicwall-vpns/
- Bitsight. (2025). Akira Ransomware Exploits SonicWall SMA100 Vulnerabilities. https://www.bitsight.com/blog/akira-ransomware-exploits-sonicwall-sma100-vulnerabilities-what-you-need-know
- Rapid7. (2025). Akira Ransomware Group Utilizing SonicWall Devices for Initial Access. https://www.rapid7.com/blog/post/dr-akira-ransomware-group-utilizing-sonicwall-devices-for-initial-access/
- ReliaQuest. (2026). Threat Spotlight: Akira Ransomware's SonicWall Campaign Creates Enterprise M&A Risk. https://reliaquest.com/blog/threat-spotlight-akira-ransomwares-sonicwall-campaign-creates-enterprise-m&a-risk/
- Darktrace. (2025-2026). Inside Akira's SonicWall Campaign. https://www.darktrace.com/blog/inside-akiras-sonicwall-campaign-darktraces-detection-and-response
- Chainalysis. (2026). 2026 Crypto Crime Report: Ransomware. https://www.chainalysis.com/blog/crypto-ransomware-2026/
- BlackFog. (2026). The State of Ransomware 2026. https://www.blackfog.com/the-state-of-ransomware-2026/
- Verizon. (2026). 2026 Data Breach Investigations Report. https://www.verizon.com/business/resources/reports/dbir/
- Microsoft Learn. (2026). How multifactor authentication works. https://learn.microsoft.com/en-us/entra/identity/authentication/concept-mfa-howitworks