

Apache Pinot Vulnerability Allows Remote Attackers to Bypass Authentication
March 7, 2025
North Korean IT Workers Exploiting GitHub to Target Organizations Worldwide
March 7, 2025
Apache Pinot Vulnerability Allows Remote Attackers to Bypass Authentication
March 7, 2025
North Korean IT Workers Exploiting GitHub to Target Organizations Worldwide
March 7, 2025Severity
High
Analysis Summary
A cybersecurity firm discovered that the Akira ransomware gang used an unsecured webcam to encrypt files on a victim’s network, bypassing Endpoint Detection and Response (EDR) protections. The attackers initially gained access through an exposed remote access solution, likely using stolen credentials or brute force. They then installed AnyDesk for remote access, stole data for double extortion, and moved laterally using Remote Desktop Protocol (RDP).
Akira attempted to deploy ransomware via a password-protected ZIP file (win.zip) containing the encryptor (win.exe), but the EDR solution detected and quarantined it. In response, the attackers scanned for alternative attack vectors and found a vulnerable webcam running a Linux-based OS. Since the webcam had remote shell access and lacked EDR monitoring, Akira used it to mount Windows SMB network shares and deploy a Linux-based ransomware encryptor.

Because the security team did not monitor the webcam, the increase in malicious SMB traffic went unnoticed, allowing the attackers to encrypt files across the network. Researchers confirmed that patches were available for the exploited webcam vulnerabilities, meaning the attack could have been prevented.
This case highlights that EDR alone is insufficient for cybersecurity, and IoT devices like webcams and fingerprint scanners can be exploited if not secured. Organizations should isolate IoT devices from critical networks, apply firmware updates regularly, and monitor all networked devices to prevent such attacks.
Impact
- Credentials Theft
- Data Exfiltration
- Lateral Movement
Remediation
- Regularly update IoT device firmware to fix vulnerabilities.
- Disable remote access and unnecessary services on IoT devices.
- Change default credentials and use strong, unique passwords for all IoT devices.
- Isolate IoT devices from critical systems using VLANs or separate subnets.
- Deploy network traffic analysis (NTA) to detect unusual activity from IoT devices.
- Configure SIEM solutions to flag unexpected SMB traffic or unauthorized remote access attempts.
- Use Extended Detection and Response (XDR) to monitor IoT and network-level threats.
- Implement multi-factor authentication (MFA) for remote access to prevent brute-force attacks.
- Restrict access to AnyDesk, RDP, and other remote access tools to trusted users only.
- Apply the least privilege principle to ensure IoT devices and user accounts have minimal necessary access.
- Limit SMB file-sharing permissions to authorized users and devices.
- Set up alerts for unusual file encryption activities over SMB.
- Use Network Access Control (NAC) to prevent unauthorized devices from connecting to critical networks.
- Maintain offline, immutable backups to restore encrypted files if needed.
- Develop an incident response plan to quickly contain threats and isolate compromised devices.
- Conduct security awareness training to educate employees on phishing, credential security, and IoT risks.