Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Widespread SonicWall Firewall Attacks Exploiting Vulnerabilities

Widespread SonicWall Firewall Attacks Exploiting Vulnerabilities

Posted on March 2, 2026 By CWS

An extensive reconnaissance effort is targeting SonicWall firewalls globally, with over 4,000 unique IP addresses used to identify susceptible devices. This large-scale campaign is a precursor to potential exploitation attempts aimed at SonicWall SonicOS users. The activity, spanning from February 22 to February 25, 2026, saw threat actors initiate 84,142 scanning sessions originating from 4,305 different IP addresses across 20 autonomous systems.

Potential Impact of the Campaign

The coordinated nature and magnitude of this campaign suggest an imminent exploitation wave, posing a significant threat to thousands of organizations. Historically, SonicWall’s SSL VPN has been a primary access point for ransomware groups. The current campaign targets the SonicOS REST API endpoint, a critical step in identifying active SSL VPNs before launching more aggressive tactics on confirmed targets. Notably, 92% of recorded sessions focused on this API path, indicating the attackers’ intent to build a comprehensive list of potential victims.

Historical Context and Scale

Research by GreyNoise reveals that this campaign involved three distinct operational infrastructure clusters functioning in unison over four days. The pattern mirrors a similar operation documented in December 2025, where attackers conducted nine million scans against both Palo Alto and SonicWall VPN infrastructures using over 7,000 IP addresses with identical client fingerprints. This latest activity signifies a continuation and escalation of previous efforts.

Alarmingly, more than 430,000 SonicWall firewalls are accessible online, with over 25,000 SSL VPN devices harboring critical vulnerabilities and approximately 20,000 running outdated firmware. Since March 2023, the Akira ransomware group exploited SonicWall VPN access to compromise at least 250 organizations, amassing approximately $244 million in ransom payments.

Technical Tactics Employed

A notable aspect of the campaign is the use of a commercial proxy service, which contributed to 32% of the campaign’s volume, or about 27,119 sessions, through 4,102 rotating exit IP addresses managed via Canadian proxy infrastructure. This service, boasting access to over 100 million IP addresses in 150 countries, provided an anonymization layer to obscure the true origin of the scanning traffic.

The proxy usage was meticulously planned, with each exit IP averaging only 6.6 requests to evade rate-limiting and reputation-based blocking. The proxy service’s management platform was offline since December 2025, leaving its exit nodes unmonitored for abuse. Almost 70% of the sessions shared a fingerprint: a GET request over HTTP/1.0 with a Chrome 119 user agent, a combination not used by legitimate browsers, marking it as a signal of automated scanning tools.

Organizations using SonicWall devices are advised to promptly patch CVE-2024-53704, enforce multi-factor authentication for all SSL VPN users, restrict management access to trusted IPs, reset local user passwords from older firmware, monitor for suspicious HTTP/1.0 requests with modern user agents, and decommission unsupported SRA appliances vulnerable to CVE-2021-20028 and CVE-2019-7481.

Cyber Security News Tags:CVE, cyber attack, Cybersecurity, Firewall, GreyNoise, Hacking, network security, proxy service, Ransomware, SonicWall, SSL-VPN, Vulnerabilities

Post navigation

Previous Post: Madison Square Garden Confirms Major Data Breach
Next Post: Critical SD-WAN Vulnerability and AI Threats Emerge

Related Posts

Beware of Malicious Ivanti VPN Client Sites in Google Search That Delivers Malware Beware of Malicious Ivanti VPN Client Sites in Google Search That Delivers Malware Cyber Security News
Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery Cyber Security News
Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware Cyber Security News
Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack Cyber Security News
Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution Cyber Security News
SesameOp Leveraging OpenAI Assistants API for Stealthy Communication with C2 Servers SesameOp Leveraging OpenAI Assistants API for Stealthy Communication with C2 Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Windows Vulnerability Exploit Released
  • AWS Enhances Security Hub with Cross-Domain Integration
  • Chrome’s AI Assistant Vulnerability Patched to Prevent Risks
  • OCRFix Botnet Trojan Uses Blockchain for Stealth Operations
  • OpenClaw Flaw Could Allow AI Takeover via Malicious Sites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Windows Vulnerability Exploit Released
  • AWS Enhances Security Hub with Cross-Domain Integration
  • Chrome’s AI Assistant Vulnerability Patched to Prevent Risks
  • OCRFix Botnet Trojan Uses Blockchain for Stealth Operations
  • OpenClaw Flaw Could Allow AI Takeover via Malicious Sites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News