Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cyberattackers Penetrate Networks Using SonicWall SSLVPN Credentials

Cyberattackers Penetrate Networks Using SonicWall SSLVPN Credentials

Posted on February 5, 2026 By CWS

Cyberattackers Exploit SonicWall SSLVPN Vulnerabilities

Recently, cybercriminals have been exploiting vulnerabilities in SonicWall SSLVPN credentials to breach networks, deploying an advanced ‘EDR killer’ to bypass endpoint security systems. This sophisticated attack targets organizations’ defenses, highlighting significant security challenges.

Initial Access via Compromised Credentials

In early February 2026, Huntress analyzed a campaign where attackers gained entry using legitimate VPN credentials. They circumvented typical brute-force methods by leveraging a Bring Your Own Vulnerable Driver (BYOVD) attack with a revoked Guidance Software forensic driver.

This strategy enabled attackers to disable essential security processes at the kernel level, bypassing standard protective measures. The breach commenced when attackers authenticated to a SonicWall SSLVPN with compromised credentials, eliminating the need for forceful entry attempts.

Reconnaissance and Network Mapping Activities

Once inside the network, the attackers quickly began reconnaissance. SonicWall’s Intrusion Prevention System (IPS) detected high-volume activities, such as ICMP ping sweeps and NetBIOS probes. Additionally, the threat actors executed a SYN flood, generating over 370 SYNs per second, to map the internal network environment.

The successful login originated from IP address 69.10.60[.]250, while a failed attempt was recorded from 193.160.216[.]221, wherein the account lacked necessary privileges. This illustrates the attackers’ persistence and tactical approach to network infiltration.

Deployment of EDR Killer

The core aspect of the attack involved deploying a 64-bit Windows executable that installed a malicious kernel driver. The malware authors used a custom encoding tactic, substituting words from a 256-word dictionary to obfuscate the driver payload.

The malware then decoded this text into a valid Windows PE file, dropping it at C:ProgramDataOEMFirmwareOemHwUpd.sys and disguising itself as a legitimate system file. The payload registered as a kernel service, ensuring it survived system reboots.

Exploiting a Windows Driver Signature Enforcement gap, attackers successfully loaded the driver, bypassing revocation checks. This allowed them to terminate processes protected by mechanisms like Protected Process Light (PPL), targeting 59 processes from major security vendors.

Implications and Future Outlook

This attack highlights the critical need for robust security measures against increasingly sophisticated cyber threats. Organizations must ensure their systems are updated and monitor for unusual activities to mitigate such risks. As cyber threats evolve, maintaining strong network defenses and staying informed about emerging vulnerabilities is essential.

Cyber Security News Tags:BYOVD attack, Cyberattack, EDR killer, endpoint security, Huntress, Malware, network security, SonicWall, SSLVPN, Windows driver

Post navigation

Previous Post: Nullify Gains $12.5M to Enhance AI Cybersecurity Solutions
Next Post: Iranian Infy Hackers Reactivate C2 Servers After Internet Blackout

Related Posts

APT Hackers Exploited Windows WebDAV 0-Day RCE Vulnerability in the Wild to Deploy Malware APT Hackers Exploited Windows WebDAV 0-Day RCE Vulnerability in the Wild to Deploy Malware Cyber Security News
Threat Actors Using AI Generated Malicious Job Offers to Deploy PureRAT Threat Actors Using AI Generated Malicious Job Offers to Deploy PureRAT Cyber Security News
Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads Cyber Security News
MongoDB Servers at Critical Risk MongoDB Servers at Critical Risk Cyber Security News
New Google Drive Desktop Feature adds AI-powered Ransomware Detection to Prevent Cyberattacks New Google Drive Desktop Feature adds AI-powered Ransomware Detection to Prevent Cyberattacks Cyber Security News
Microsoft September 2025 Patch Tuesday Microsoft September 2025 Patch Tuesday Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News