Ransomware Shifts to Infrastructure: 73% of Attacks Exploit VPNs, At-Bay Reports

Akira Ransomware Dominates as Attackers Increasingly Target VPNs and Core Infrastructure, New Report Finds

HIGH
April 23, 2026
5m read
RansomwareThreat IntelligenceVulnerability

Related Entities

Threat Actors

Organizations

Other

At-Bay

Full Report

Executive Summary

A 2026 report from cyber insurance provider At-Bay highlights a significant evolution in ransomware tactics, with threat actors moving away from phishing and focusing on the direct exploitation of core network infrastructure. The analysis, based on thousands of insurance claims, reveals that 73% of all ransomware incidents in 2025 began with the compromise of a Virtual Private Network (VPN). The Akira ransomware group was the primary catalyst for this trend, responsible for over 40% of claims and showing a strong preference for exploiting SonicWall VPN appliances. The report underscores that traditional defenses are struggling to keep pace; 60% of Akira's victims had an Endpoint Detection and Response (EDR) solution deployed, yet were still compromised, pointing to the critical need for continuous monitoring and response capabilities.


Threat Overview

The At-Bay report signals a strategic shift in the ransomware ecosystem. Instead of relying on user interaction (e.g., clicking a malicious link), ransomware groups like Akira are adopting a more direct, infrastructure-led approach. This method is more efficient, scalable, and often bypasses user-centric security controls.

Key Findings:

  • VPNs as the Primary Vector: 73% of ransomware attacks started with a VPN compromise, nearly doubling in two years.
  • Akira's Dominance: The Akira ransomware group was responsible for over 40% of claims in the dataset.
  • SonicWall Under Fire: SonicWall VPN appliances were the most targeted technology, present in 86% of Akira-related attacks and 27% of all ransomware incidents.
  • High Ransom Demands: Akira's average ransom demand was $1.2 million, 50% higher than the average for other groups.
  • Small Businesses at Risk: Businesses with under $25 million in revenue saw a 21% increase in attack frequency and a 40% rise in severity.

This data indicates that ransomware has become a game of exploiting unpatched, internet-facing infrastructure. Groups like Akira systematically scan the internet for vulnerable devices and exploit them for initial access.

Technical Analysis

Attacks targeting VPNs typically fall into two categories:

  1. Exploitation of Vulnerabilities: Attackers use exploits for known CVEs in VPN appliances (like those from SonicWall, Fortinet, or Ivanti) to gain initial access. This is a highly effective method as many organizations are slow to patch these critical edge devices.
  2. Credential Stuffing/Brute Force: Attackers use stolen or weak credentials to log into VPN accounts that are not protected by multi-factor authentication (MFA).

Once inside, Akira and similar groups follow a standard ransomware playbook: escalate privileges, move laterally, exfiltrate sensitive data for double extortion, and finally, deploy the ransomware payload to encrypt systems.

The report's finding that 60% of victims had EDR is significant. It suggests that attackers are either using techniques to bypass or disable EDR, or that the EDR alerts were not acted upon quickly enough. This is where the value of a 24/7 Managed Detection and Response (MDR) service becomes apparent, as it provides the human element to investigate and respond to alerts around the clock.

MITRE ATT&CK Mapping

Impact Assessment

The business impact of these infrastructure-led attacks is severe. The average cost for smaller businesses reached $422,000, a figure that can be existential. The shift to targeting core infrastructure means that attacks can be more disruptive, potentially taking down entire networks rather than just individual machines. The high ransom demands from groups like Akira put immense financial pressure on victims. Furthermore, the double extortion tactic of exfiltrating data before encryption adds the costs of data breach notification, credit monitoring, and reputational damage to the recovery equation.

IOCs — Directly from Articles

No specific Indicators of Compromise were provided in the report summary.

Cyber Observables — Hunting Hints

Security teams should focus on hunting for signs of VPN compromise:

Type
Log Source
Value/Pattern
VPN Server Logs
Context / Where to look
Look for multiple failed logins followed by a success from a single IP, successful logins from unusual countries, or multiple accounts logging in from the same IP.
Type
Network Traffic Pattern
Value/Pattern
Data flow from VPN user subnets to sensitive servers (e.g., Domain Controllers) using protocols other than what is expected (e.g., RDP, SMB).
Context / Where to look
Network flow data (NetFlow/sFlow), IDS/IPS logs.
Type
Process Name
Value/Pattern
powershell.exe, psexec.exe, wmic.exe
Context / Where to look
Monitor for these processes being executed by the VPN service account or on systems shortly after a VPN login.
Type
URL Pattern
Value/Pattern
/api/ssl-vpn/
Context / Where to look
Monitor web logs on SonicWall devices for anomalous requests or exploit attempts against the SSL-VPN portal.

Detection & Response

  1. VPN Log Monitoring: Ingest VPN authentication logs into a SIEM. Create alerts for impossible travel (e.g., logins from different continents in a short time), logins outside of business hours, and brute force attempts.
  2. Network Baselining: Baseline normal traffic patterns for VPN users. Alert on deviations, such as a VPN user account suddenly accessing a large number of file shares or connecting to servers they don't normally use.
  3. EDR/MDR: As the report highlights, EDR is necessary but not sufficient. Alerts must be investigated 24/7. An MDR service or a well-staffed internal SOC is crucial to catch attackers in the early stages of lateral movement before they can deploy ransomware.

Mitigation

  • Patch Management: Prioritize patching of all internet-facing devices, especially VPNs, firewalls, and remote access gateways. Subscribe to vendor security advisories and treat vulnerabilities in these devices as critical.
  • Multi-Factor Authentication (MFA): Enforce MFA on all VPN connections. This is the single most effective control against credential-based attacks.
  • Network Segmentation: Segment the network to prevent attackers who gain a foothold via VPN from immediately accessing the entire internal network. VPN users should be placed in a restricted network segment with limited access.
  • Least Privilege: Grant VPN users access only to the specific resources they need to do their jobs. Avoid providing broad network access.
  • EDR + MDR: Combine endpoint protection with 24/7 managed detection and response to ensure that alerts are triaged and acted upon immediately.

D3FEND Techniques:

Timeline of Events

1
April 23, 2026
This article was published

MITRE ATT&CK Mitigations

Enforcing MFA on all VPN connections is the most critical defense against credential-based attacks.

Mapped D3FEND Techniques:

Aggressively patch internet-facing infrastructure like SonicWall VPNs to close known vulnerabilities.

Mapped D3FEND Techniques:

Isolate VPN user traffic into a restricted zone to limit the blast radius of a compromised session.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The At-Bay report confirms that VPNs are the primary entry point for ransomware. The single most effective countermeasure is to enforce phishing-resistant Multi-factor Authentication (MFA) on all remote access solutions, including SonicWall VPNs. This is not optional. Standard username/password combinations are insufficient against credential stuffing and other password-based attacks. Organizations should prioritize the rollout of MFA using methods like FIDO2/WebAuthn hardware tokens, which are resistant to phishing, or at a minimum, authenticator apps. This single control would have prevented a large percentage of the credential-based VPN compromises that lead to ransomware events. The implementation should be comprehensive, covering not just standard users but also administrative accounts, service accounts, and third-party contractors with VPN access.

Assuming a VPN compromise will eventually happen, Network Isolation (or segmentation) is the next critical defense. Instead of granting VPN users broad access to the entire corporate network, their sessions should terminate in a highly restricted 'DMZ-like' zone. From this zone, firewall rules should explicitly whitelist access only to the specific servers and applications that the user role requires. All other traffic, especially broad network scanning and access to critical infrastructure like Domain Controllers or backup servers, should be denied by default. This containment strategy severely limits an attacker's ability to perform reconnaissance and move laterally after gaining an initial foothold via a compromised VPN account. It turns a potential network-wide disaster into a contained security incident.

To detect compromised VPN credentials, security teams should implement User Geolocation Logon Pattern Analysis. This involves ingesting all VPN authentication logs into a SIEM or security analytics platform and enriching them with geolocation data. The system should then build a baseline of normal login locations for each user. High-fidelity alerts should be configured for anomalies, such as: 1) 'Impossible travel,' where a user logs in from two geographically distant locations in a time frame that would be impossible to travel between. 2) Logins from countries where the organization has no employees or business operations. 3) A single IP address being used to attempt logins for multiple different user accounts. These patterns are strong indicators of credential stuffing or account sharing and should trigger an automated response, such as forcing a password reset and MFA re-enrollment.

Sources & References

Ransomware is shifting towards infrastructure-led exploitation, At-Bay reports
Reinsurance News (reinsurancene.ws) April 22, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RansomwareAkiraVPNSonicWallThreat ReportCyber Insurance

📢 Share This Article

Help others stay informed about cybersecurity threats