Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SonicWall Confirms State-Sponsored Hackers Behind the Massive Firewall Backup Breach

Posted on November 6, 2025November 6, 2025 By CWS

SonicWall, a worldwide cybersecurity firm, confirmed that state-sponsored hackers have been behind a current incident involving unauthorized entry to firewall backup recordsdata.

The breach started in early September, when the corporate detected suspicious exercise involving the obtain of backup firewall configuration recordsdata saved in a cloud setting.

Upon discovery, SonicWall shortly activated its incident response plan, known as in Mandiant, a widely known cybersecurity response agency, and notified companions and clients immediately.

The corporate maintained frequent and clear communication, internet hosting dwell Q&A periods and offering instruments and steerage to assist companions reply successfully.

SonicWall additionally provided business concessions to assist companions as they labored by means of remediation steps.

Mandiant Investigation Reveals Cloud-Remoted Assault

Mandiant’s thorough investigation has now concluded. The outcomes present that the attackers, linked to a state-sponsored risk group, used an API name to entry cloud backup recordsdata saved in a selected cloud setting.

In line with the findings, this incident didn’t relate to the current world Akira ransomware assaults concentrating on firewalls and edge gadgets.

Importantly, SonicWall confirmed that its merchandise, firmware, and different programs, like supply code and buyer networks, weren’t impacted or compromised.

All remediation actions really helpful by Mandiant have been applied, and SonicWall continues to work carefully with safety consultants to strengthen its cloud and community infrastructure additional.

The corporate emphasised that its long-standing deal with safety excellence and associate assist stays agency. Earlier within the 12 months, SonicWall launched a Safe by Design modernization initiative.

This included updates to product structure, cloud operations, inside cybersecurity practices, and the appointment of a brand new Chief Data Officer.

The corporate additionally continues to put money into superior response groups and cutting-edge safety instruments. SonicWall’s dedication to remain forward is underscored by exterior validation.

Whilst nation-state risk actors more and more goal safety distributors, SonicWall is dedicated to transparency, sturdy partnerships, and relentless enchancment to safeguard its clients and companions worldwide.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Backup, Breach, Confirms, Firewall, Hackers, Massive, SonicWall, StateSponsored

Post navigation

Previous Post: Follow Pragmatic Interventions to Keep Agentic AI in Check
Next Post: Truffle Security Raises $25 Million for Secret Scanning Engine

Related Posts

New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations Cyber Security News
Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’ Cyber Security News
XLoader Malware Analyzed Using ChatGPT’s, Breaks RC4 Encryption Layers in Hours Cyber Security News
SparkKitty Attacks iOS and Android Devices in Wild Via App Store and Google Play Cyber Security News
Critical Trend Micro Apex One Management RCE Vulnerability Actively Exploited in the wild Cyber Security News
Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iranian Hackers Targeting Academics and Foreign Policy Experts Using RMM Tools
  • Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server
  • List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities
  • Airstalk Malware Leverages AirWatch API MDM Platform to Establish Covert C2 Communication
  • Researchers Hack ChatGPT Memories and Web Search Features

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iranian Hackers Targeting Academics and Foreign Policy Experts Using RMM Tools
  • Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server
  • List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities
  • Airstalk Malware Leverages AirWatch API MDM Platform to Establish Covert C2 Communication
  • Researchers Hack ChatGPT Memories and Web Search Features

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News