Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported

Posted on August 5, 2025August 5, 2025 By CWS

Aug 05, 2025Ravie LakshmananZero-Day / Community Safety
SonicWall stated it is actively investigating stories to find out if there’s a new zero-day vulnerability following stories of a spike in Akira ransomware actors in late July 2025.
“Over the previous 72 hours, there was a notable improve in each internally and externally reported cyber incidents involving Gen 7 SonicWall firewalls the place SSLVPN is enabled,” the community safety vendor stated in a press release.
“We’re actively investigating these incidents to find out whether or not they’re related to a beforehand disclosed vulnerability or if a brand new vulnerability could also be accountable.”

Whereas SonicWall is digging deeper, organizations utilizing Gen 7 SonicWall firewalls are suggested to observe the steps beneath till additional discover –

Disable SSL VPN providers the place sensible
Restrict SSL VPN connectivity to trusted IP addresses
Activate providers corresponding to Botnet Safety and Geo-IP Filtering
Implement multi-factor authentication
Take away inactive or unused native consumer accounts on the firewall, notably these with SSL VPN entry
Encourage common password updates throughout all consumer accounts

The event comes shortly after Arctic Wolf revealed it had recognized a surge in Akira ransomware exercise focusing on SonicWall SSL VPN units for preliminary entry since late final month.
Huntress, in a follow-up evaluation printed Monday, additionally stated it has noticed risk actors pivoting on to area controllers merely a couple of hours after the preliminary breach.
Assault chains start with the breach of the SonicWall equipment, adopted by the attackers taking a “well-worn” post-exploitation path to conduct enumeration, detection evasion, lateral motion, and credential theft.

The incidents additionally contain the dangerous actors methodically disabling Microsoft Defender Antivirus and deleting quantity shadow copies previous to deploying Akira ransomware.
Huntress stated it detected round 20 completely different assaults tied to the newest assault wave beginning on July 25, 2025, with variations noticed within the tradecraft used to tug them off, together with in the usage of instruments for reconnaissance and persistence, corresponding to AnyDesk, ScreenConnect, or SSH.
There may be proof to counsel that the exercise could also be restricted to TZ and NSa-series SonicWall firewalls with SSL VPN enabled, and that the suspected flaw exists in firmware variations 7.2.0-7015 and earlier.
“The pace and success of those assaults, even in opposition to environments with MFA enabled, strongly counsel a zero-day vulnerability is being exploited within the wild,” the cybersecurity firm stated. “It is a vital, ongoing risk.”

The Hacker News Tags:Attacks, Investigating, Potential, Reported, SonicWall, SSL, Targeted, VPN, ZeroDay

Post navigation

Previous Post: How to Secure a Web Application Firewall (WAF)
Next Post: Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code

Related Posts

How To Automate Ticket Creation, Device Identification and Threat Triage With Tines The Hacker News
CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center The Hacker News
Microsoft Removes Password Management from Authenticator App Starting August 2025 The Hacker News
Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads The Hacker News
Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims The Hacker News
New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Is Transforming Cybersecurity Adversarial Testing
  • Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’
  • CISA Adds 3 D-Link Vulnerabilities to KEV Catalog Amid Active Exploitation Evidence
  • Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks
  • CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Is Transforming Cybersecurity Adversarial Testing
  • Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’
  • CISA Adds 3 D-Link Vulnerabilities to KEV Catalog Amid Active Exploitation Evidence
  • Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks
  • CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News