Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cyberattackers Penetrate Networks Using SonicWall SSLVPN Credentials

Cyberattackers Penetrate Networks Using SonicWall SSLVPN Credentials

Posted on February 5, 2026 By CWS

Cyberattackers Exploit SonicWall SSLVPN Vulnerabilities

Recently, cybercriminals have been exploiting vulnerabilities in SonicWall SSLVPN credentials to breach networks, deploying an advanced ‘EDR killer’ to bypass endpoint security systems. This sophisticated attack targets organizations’ defenses, highlighting significant security challenges.

Initial Access via Compromised Credentials

In early February 2026, Huntress analyzed a campaign where attackers gained entry using legitimate VPN credentials. They circumvented typical brute-force methods by leveraging a Bring Your Own Vulnerable Driver (BYOVD) attack with a revoked Guidance Software forensic driver.

This strategy enabled attackers to disable essential security processes at the kernel level, bypassing standard protective measures. The breach commenced when attackers authenticated to a SonicWall SSLVPN with compromised credentials, eliminating the need for forceful entry attempts.

Reconnaissance and Network Mapping Activities

Once inside the network, the attackers quickly began reconnaissance. SonicWall’s Intrusion Prevention System (IPS) detected high-volume activities, such as ICMP ping sweeps and NetBIOS probes. Additionally, the threat actors executed a SYN flood, generating over 370 SYNs per second, to map the internal network environment.

The successful login originated from IP address 69.10.60[.]250, while a failed attempt was recorded from 193.160.216[.]221, wherein the account lacked necessary privileges. This illustrates the attackers’ persistence and tactical approach to network infiltration.

Deployment of EDR Killer

The core aspect of the attack involved deploying a 64-bit Windows executable that installed a malicious kernel driver. The malware authors used a custom encoding tactic, substituting words from a 256-word dictionary to obfuscate the driver payload.

The malware then decoded this text into a valid Windows PE file, dropping it at C:ProgramDataOEMFirmwareOemHwUpd.sys and disguising itself as a legitimate system file. The payload registered as a kernel service, ensuring it survived system reboots.

Exploiting a Windows Driver Signature Enforcement gap, attackers successfully loaded the driver, bypassing revocation checks. This allowed them to terminate processes protected by mechanisms like Protected Process Light (PPL), targeting 59 processes from major security vendors.

Implications and Future Outlook

This attack highlights the critical need for robust security measures against increasingly sophisticated cyber threats. Organizations must ensure their systems are updated and monitor for unusual activities to mitigate such risks. As cyber threats evolve, maintaining strong network defenses and staying informed about emerging vulnerabilities is essential.

Cyber Security News Tags:BYOVD attack, Cyberattack, EDR killer, endpoint security, Huntress, Malware, network security, SonicWall, SSLVPN, Windows driver

Post navigation

Previous Post: Nullify Gains $12.5M to Enhance AI Cybersecurity Solutions
Next Post: Iranian Infy Hackers Reactivate C2 Servers After Internet Blackout

Related Posts

10 Best Cyber Attack Maps 10 Best Cyber Attack Maps Cyber Security News
48M Gmail, 6.5M Instagram Exposed Online From Unprotected Database 48M Gmail, 6.5M Instagram Exposed Online From Unprotected Database Cyber Security News
Cybersecurity News Weekly Newsletter – 29.7 Tbps DDoS Attack, Chrome 143, React2Shell Vulnerabilities and Cloudflare Outage Cybersecurity News Weekly Newsletter – 29.7 Tbps DDoS Attack, Chrome 143, React2Shell Vulnerabilities and Cloudflare Outage Cyber Security News
Microsoft Teams Introduces New Feature to Boost Performance and Startup Speed Microsoft Teams Introduces New Feature to Boost Performance and Startup Speed Cyber Security News
Actionable Threat Intelligence for Mitigating Emerging Cyber Threats Actionable Threat Intelligence for Mitigating Emerging Cyber Threats Cyber Security News
American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Betterment Breach Affects 1.4 Million Accounts
  • VS Code Flaws in GitHub Codespaces Risk Supply Chain Attacks
  • ShadowSyndicate Adopts Server Transition in Cyber Attacks
  • Substack Data Breach: User Information Leaked by Hacker
  • Cybercrime Trends: Codespaces Exploits and More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Betterment Breach Affects 1.4 Million Accounts
  • VS Code Flaws in GitHub Codespaces Risk Supply Chain Attacks
  • ShadowSyndicate Adopts Server Transition in Cyber Attacks
  • Substack Data Breach: User Information Leaked by Hacker
  • Cybercrime Trends: Codespaces Exploits and More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark