Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks

Posted on October 9, 2025October 9, 2025 By CWS

Oct 09, 2025Ravie LakshmananCloud Safety / Community Safety
SonicWall on Wednesday disclosed that an unauthorized get together accessed firewall configuration backup recordsdata for all clients who’ve used the cloud backup service.
“The recordsdata include encrypted credentials and configuration knowledge; whereas encryption stays in place, possession of those recordsdata might improve the chance of focused assaults,” the corporate stated.
It additionally famous that it is working to inform all companions and clients, including it has launched instruments to help with gadget evaluation and remediation. The corporate can be urging customers to log in and verify for his or her gadgets.
The event comes a few weeks after SonicWall urged clients to carry out a credential reset after their firewall configuration backup recordsdata had been uncovered in a safety breach impacting MySonicWall accounts.

The checklist of impacted gadgets accessible on the MySonicWall portal has been assigned a precedence degree to assist clients prioritize remediation efforts. The labels are as follows –

Energetic – Excessive Precedence: Units with internet-facing companies enabled
Energetic – Decrease Precedence: Units with out internet-facing companies
Inactive: Units that haven’t pinged dwelling for 90 days

It beforehand acknowledged that the risk actors accessed backup firewall choice recordsdata saved within the cloud for lower than 5% of its clients, whereas emphasizing that the credentials inside these recordsdata had been encrypted however that in addition they included “data that would make it simpler for attackers to doubtlessly exploit the associated firewall.”
Customers are suggested to observe the steps beneath with speedy impact –

Log in to MySonicWall.com account and confirm if cloud backups exist for registered firewalls
If fields are clean, there is no such thing as a impression
If fields include backup particulars, confirm whether or not impacted serial numbers are listed within the account
If Serial Numbers are proven, customers ought to observe the containment and remediation pointers for the listed firewalls

SonicWall stated in instances the place clients have used the Cloud Backup function however no Serial Numbers are proven or solely among the registered Serial Numbers are displayed, it should present extra steerage in coming days.

The Hacker News Tags:Access, Backups, Checks, Cloud, Firewall, Hackers, Security, SonicWall, Spark, Urgent

Post navigation

Previous Post: Hackers Exploit DFIR Tool Velociraptor In Ransomware Attacks
Next Post: Lightship Security and OpenSSL Submit Version 3.5.4 for FIPS 140-3 Validation

Related Posts

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices The Hacker News
Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads The Hacker News
Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam The Hacker News
Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options The Hacker News
A Pragmatic Approach To NHI Inventories  The Hacker News
Key Insights from the 2025 State of Pentesting Report The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Quishing Attack With Weaponized QR Code Targeting Microsoft Users
  • Hackers Actively Exploiting WordPress Plugin Vulnerability to Gain Admin Access
  • Threat Actors Mimic as HR Departments to Steal Your Gmail Login Credentials
  • Hackers Upgraded ClickFix Attack With Cache Smuggling to Secretly Download Malicious Files
  • New Polymorphic Python Malware Repeatedly Mutate its Appearance at Every Execution Time

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Quishing Attack With Weaponized QR Code Targeting Microsoft Users
  • Hackers Actively Exploiting WordPress Plugin Vulnerability to Gain Admin Access
  • Threat Actors Mimic as HR Departments to Steal Your Gmail Login Credentials
  • Hackers Upgraded ClickFix Attack With Cache Smuggling to Secretly Download Malicious Files
  • New Polymorphic Python Malware Repeatedly Mutate its Appearance at Every Execution Time

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News