AI Governance for AV Manufacturers: Why Label Governance MattersReal Change, Start with Label Governance.
This post was originally shared on the S-RM blog SRMinform, copy and pasted here without permission
https://www.s-rminform.com/latest-thinking/camera-off-akira-deploys-ransomware-via-webcam
While the S-RM team encountered more threat actors than ever before last year, one group was responsible for more incidents than any other. Akira, a well-established ransomware group, accounted for 15% of the incidents we responded to in 2024, and deployed some novel techniques for evading cyber defences along the way. In this article, our team details how Akira was able to compromise an unsecured webcam in order to circumvent an Endpoint Detection and Response (EDR) tool and deploy ransomware.
The S-RM team recently responded to an Akira ransomware incident in which the victim organisation had deployed EDR to hosts on their network. The EDR tool identified and quarantined the ransomware binary, which inhibited Akira’s ability to deploy the malicious code across the victim’s environment. Not to be deterred, the threat actor then conducted a network scan and identified an unsecured webcam on the same network. Akira was able to compromise this device and deploy ransomware from it, ultimately circumventing the EDR tool.

Akira ransomware IoT attack chain
Until the webcam compromise, this incident had followed Akira’s typical modus operandi. After compromising the victim’s network via an externally facing remote access solution, the group deployed AnyDesk.exe, a remote management and monitoring tool, to retain access to the network, before exfiltrating data.
During the latter stages of the attack, the attacker moved to a server on the victim’s network via remote desktop protocol (RDP). Akira commonly uses RDP as it enables them to interact with endpoints and blend in with system administrators, who use RDP legitimately. The threat actor initially attempted to deploy the ransomware on one of the Windows servers as a password-protected zip file (‘win.zip’) that contained the ransomware binary (‘win.exe’). However, the victim’s EDR tool immediately identified and quarantined the compressed file before it was unzipped and deployed.
At this point, the threat actor likely realised they had alerted the EDR tool and would not be able to evade its defences. They therefore pivoted their approach. Prior to the ransomware deployment attempt to this Windows server, the attacker had conducted an internal network scan to identify open ports, services, and devices. This network scan identified several Internet of Things (‘IoT’) devices on the victim’s network, including webcams and a fingerprint scanner. These devices presented an opportunity to the threat actor to evade the EDR tool and deploy the ransomware successfully.
The threat actor likely identified a webcam as a suitable target device for deploying ransomware for three reasons:
After identifying the webcam as a suitable target, the threat actor began deploying their Linux-based ransomware with little delay. As the device was not being monitored, the victim organisation's security team were unaware of the increase in malicious Server Message Block (SMB) traffic from the webcam to the impacted server, which otherwise may have alerted them.[1] Akira was subsequently able to encrypt files across the victim’s network.[2]
[1] There are several options for threat actors to deploy ransomware from IoT devices and deploying via SMB protocol remains one of the easiest. Though this protocol is significantly less efficient, it can still be a potent vector for threat actors. Particularly when used on devices which are incompatible with EDR or EPP systems, preventing adequate continuous monitoring of activity.
[2] SMB is a network protocol commonly used for communication between devices and threat actors and is commonly exploited to deploy ransomware.
The S-RM team identified three key security takeaways from the incident:
Preventing and remediating novel attacks like this one can be challenging. At a minimum, organisations should monitor network traffic from their IoT devices and detect anomalies. They should also consider adopting the following security practices:
S-RM identified the ransomware binaries, which had the following signatures:
| Indicator name | Description | SHA-1 Hash value |
| win.exe | Akira ransomware binary for Windows machines. | 3920f3c63686514e8e0288f8227e92c969d690e5 |
| win.zip | Compressed folder that contained the Akira ransomware binary. | b5a5bd9f727623b2eeea051e1dd7d57705daa03a |
| e7 | Akira ransomware binary for Linus and ESXi machines. | ac9952bcfcecab7400e837d55f91e9a5eeb67d07 |
| AnyDesk.exe | A legitimate remote management and monitoring tool | Hash was not retrievable. |
If you have concerns about your organisation’s exposure or have further questions on this development, contact S-RM’s Incident Response team here for additional information.
► WHAT I DO:
Results-driven professional with extensive, real-world experience in Audio Visual (AV), Information Technology (IT), and Cybersecurity. Proficient in leading cross-functional teams, implementing robust security measures, and optimizing technology infrastructure. Adept at leveraging advanced certifications, including Avixa CTS-D, ISC2 CISSP, CompTIA Security+, ISACA CISM, a certificate from Harvard, a Bachelor of Science in Computer Engineering and Master of Science in Cybersecurity from Georgia Tech. Committed to staying at the forefront of industry trends and technologies, and leading by example.
► MY LEADERSHIP STYLE:
• Manages issues and solutions with poise and confidence.
• Leads and demonstrates the ability to gain support at all levels of the organization.
• Maintains a strong sense of urgency to get things done thoroughly, not quickly, and delegates responsibility to others in a personable way.
• Plans for the big picture while adapting to shifting gears to achieve goals, using strong foresight and organizational skills.
►WHAT SETS ME APART FROM THE REST:
• Audiovisual + IT + Cybersecurity + Architectural + Marketing experience
• Seasoned engineer / architect with broad and in-depth technical, analytical, and conceptual skills
• Proven track record of effectively communicating with business leadership and other vendors
• Strong interpersonal and collaborative skills to drive security messages to teams
• Extensive knowledge of subcontracting, construction projects, labor estimates, privacy, control system protocols, and integrated audiovisual systems
▶ RELEVANT EXPERIENCE:
🔹 Cybersecurity:
• Developed and executed cybersecurity strategies to safeguard critical systems and mitigate potential threats.
• Conducted vulnerability assessments and advanced hunting techniques to identify and address security vulnerabilities.
• Collaborated with cross-functional teams to ensure compliance with industry regulations and best practices.
🔹 AV and IT:
• Successfully managed and supported AV and IT operations, overseeing the implementation and maintenance of technology solutions in military facilities, and audio visual integrators nationwide.
• Led the design and deployment of integrated AV systems, enhancing collaboration and communication across the organization.
• Implemented cybersecurity protocols to protect sensitive data and mitigate security risks.
#GeorgiaTech #Harvard #RiskManagement #SecOps #SecurityOperationsCenter #CloudSecurity #DFIR #SecurityAuditing #Cybersecurity #Confidentiality #Integrity #Availability #IncidentResponse #InfoSec #NetworkSecurity #DataPrivacy #ThreatIntelligence #CTS-D #CISSP #CISM
Xchange Advocates are recognized AV/IT industry thought leaders and influencers. We invite you to connect with them and follow their activity across the community as they offer valuable insights and expertise while advocating for and building awareness of the AV industry.
We and selected partners, use cookies or similar technologies as specified in the cookie policy and privacy policy.
You can consent to the use of such technologies by closing this notice.
Please sign in or register for FREE
If you are a registered user on AVIXA Xchange, please sign in