Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability

Posted on August 7, 2025August 7, 2025 By CWS

SonicWall has been investigating stories a few zero-day probably being exploited in ransomware assaults, however discovered no proof of a brand new vulnerability in its merchandise. 

Cybersecurity firms Huntress, Arctic Wolf and Subject Impact warned just lately that they’ve been seeing Akira ransomware assaults concentrating on SonicWall firewalls with SSL VPN enabled by what could also be a zero-day vulnerability.

SonicWall quickly introduced an investigation and on Wednesday revealed that the assaults don’t seem to contain exploitation of a zero-day vulnerability affecting Gen 7 or newer firewalls.    

The corporate decided with excessive confidence that there isn’t any zero-day and as an alternative the assaults look like associated to the exploitation of CVE-2024-40766, a vulnerability that got here to gentle in September 2024, when the seller warned that it could have been exploited within the wild.

Experiences emerged quickly after disclosure that the vulnerability was apparently exploited in ransomware assaults, particularly Akira assaults. 

The issue, as SonicWall suggests now, is that risk actors exploited the vulnerability to acquire machine credentials. The gadgets have since been up to date and could also be totally patched, but when their directors didn’t change the compromised credentials attackers can nonetheless use them to realize entry.

“We’re at present investigating lower than 40 incidents associated to this cyber exercise,” SonicWall stated. “Lots of the incidents relate to migrations from Gen 6 to Gen 7 firewalls, the place native person passwords had been carried over in the course of the migration and never reset.”

The corporate additionally identified that “resetting passwords was a vital step outlined within the unique advisory”.Commercial. Scroll to proceed studying.

Nevertheless — based mostly on archived variations of SonicWall’s advisory — the password replace recommendation was solely added in some unspecified time in the future in January 2025. A snapshot from December 2024 reveals that the password suggestion was not there. 

Subject Impact identified in its latest weblog submit that it has seen a Gen 8 SonicWall firewall being compromised within the assaults. The corporate continues to be analyzing the incident, but it surely appears the shopper in query migrated from Gen 7 to Gen 8. SonicWall’s alert focuses on recommendation for purchasers who imported configurations from Gen 6 to Gen 7 and newer. 

Google warned in mid-July {that a} financially motivated risk actor tracked as UNC6148 had been noticed concentrating on SonicWall SMA home equipment in what is probably going a special marketing campaign. 

Nevertheless, Google stated on the time the attackers had been possible leveraging credentials obtained beforehand by the exploitation of recognized vulnerabilities to entry gadgets that had since been patched however whose admins had not modified the compromised passwords. 

UNC6148 had deployed a brand new piece of malware named Overstep, which has been described as a persistent backdoor and user-mode rootkit that allows the theft of credentials, session tokens and one-time password seeds. 

Associated: SonicWall Patches Crucial SMA 100 Vulnerability, Warns of Latest Malware Assault

Associated: SonicWall Firewall Vulnerability Exploited After PoC Publication

Associated: CISA Warns of Zyxel Firewall Vulnerability Exploited in Assaults

Security Week News Tags:Attacks, Dont, Involve, SonicWall, Vulnerability, ZeroDay

Post navigation

Previous Post: SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability
Next Post: SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others

Related Posts

Cityworks Zero-Day Exploited by Chinese Hackers in US Local Government Attacks Security Week News
Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites Security Week News
Steelmaker Nucor Says Hackers Stole Data in Recent Attack Security Week News
Zoomcar Says Hackers Accessed Data of 8.4 Million Users Security Week News
Black Hat USA 2025 – Summary of Vendor Announcements (Part 1) Security Week News
In Other News: FBI Warns of BadBox 2, NSO Disputes WhatsApp Fine, 1,000 Leave CISA Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure Docker Containers
  • SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others
  • SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability
  • SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability
  • ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Secure Docker Containers
  • SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others
  • SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability
  • SonicWall Confirms No New SSLVPN 0-Day Ransomware Attack Linked to Old Vulnerability
  • ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News