Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation

Posted on August 5, 2025August 5, 2025 By CWS

A just lately noticed surge in ransomware assaults focusing on SonicWall firewalls for preliminary entry suggests {that a} potential zero-day vulnerability is exploited, safety researchers warn.

Google Risk Intelligence Group (GTIG) was the primary to warn of the brand new wave of exercise in mid-July, when it famous that login data stolen in earlier assaults was possible used to compromise SonicWall home equipment that had been totally patched towards recognized vulnerabilities.

As a part of the noticed incidents, the menace actors had been deploying a brand new backdoor/user-mode rootkit dubbed Overstep, which was designed to change the gadget’s boot course of for persistence and knowledge theft.

On the similar time, GTIG famous that the menace actor behind the assaults, tracked as UNC6148, “could have used an unknown zero-day distant code execution vulnerability to deploy Overstep on opportunistically focused SonicWall SMA home equipment”.

In early August, cybersecurity companies Arctic Wolf and Huntress issued contemporary alerts on cyberattacks focusing on SonicWall home equipment to bypass MFA, and SonicWall acknowledged the surge in exercise, noting it was trying into the potential exploitation of a zero-day.

“We’re actively investigating these incidents to find out whether or not they’re linked to a beforehand disclosed vulnerability or if a brand new vulnerability could also be accountable,” SonicWall stated on Monday.

Arctic Wolf stated it has noticed assaults involving VPN entry via SonicWall SSL VPNs, and that collected proof factors to a zero-day flaw.

“In some cases, totally patched SonicWall units had been affected following credential rotation. Regardless of TOTP MFA being enabled, accounts had been nonetheless compromised in some cases,” the corporate stated.Commercial. Scroll to proceed studying.

Huntress too warns of profitable assaults towards home equipment with MFA enabled, noting that the menace actors had been seen pivoting to area controllers inside hours after preliminary entry.

“Throughout our investigation into telemetry associated to this exercise, we’ve discovered proof to counsel that this compromise could also be restricted to TZ and NSa-series SonicWall firewalls with SSLVPN enabled. We are able to affirm that the suspected vulnerability exists in firmware variations 7.2.0-7015 and earlier,” Huntress stated.

The marketing campaign is focusing on Gen 7 SonicWall firewalls with SSLVPN enabled, and SonicWall recommends that clients disable SSLVPN providers, restrict the SSLVPN connectivity to trusted IPs, allow safety providers to detect menace exercise, implement MFA, take away unused accounts, and make sure that all passwords are up to date.

“Please stay vigilant and apply the above mitigations instantly to cut back publicity whereas we proceed our investigation,” SonicWall famous.

Associated: SonicWall Patches Crucial SMA 100 Vulnerability, Warns of Current Malware Assault

Associated: Apple Patches Safari Vulnerability Flagged as Exploited Towards Chrome

Associated: Excessive-Severity Flaws Patched in Chrome, Firefox

Associated: New ‘ResolverRAT’ Concentrating on Healthcare, Pharmaceutical Organizations

Security Week News Tags:Exploitation, Firewall, Hunts, SonicWall, Surge, ZeroDay

Post navigation

Previous Post: 15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign
Next Post: Critical Android System Component Vulnerability Let Attackers Execute Remote Code without User Interaction

Related Posts

Chinese APT Hacking Routers to Build Espionage Infrastructure Security Week News
1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking Security Week News
RevEng.ai Raises $4.15 Million to Secure Software Supply Chain Security Week News
Critical Vulnerability Patched in Citrix NetScaler Security Week News
Chinese Hackers Hit Drone Sector in Supply Chain Attacks Security Week News
iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure an E-commerce Website
  • 25 Controls, Mapped And Audit-Ready
  • New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands
  • How Certificate Mismanagement Opens The Door For Phishing And MITM Attacks
  • How To Get Real-Time IOCs From Incidents Across 15K SOCs 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Secure an E-commerce Website
  • 25 Controls, Mapped And Audit-Ready
  • New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands
  • How Certificate Mismanagement Opens The Door For Phishing And MITM Attacks
  • How To Get Real-Time IOCs From Incidents Across 15K SOCs 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News