Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SonicWall Releases Firmware Update to Remove Rootkit Malware ‘OVERSTEP’ from SMA Devices

Posted on September 23, 2025September 23, 2025 By CWS

SonicWall has issued an pressing firmware replace, model 10.2.2.2-92sv, for its Safe Cell Entry (SMA) 100 sequence home equipment to detect and take away recognized rootkit malware.

The advisory, SNWLID-2025-0015, revealed on September 22, 2025, strongly recommends that each one customers of SMA 210, 410, and 500v units apply the replace instantly to guard towards persistent threats.

This launch introduces extra file-checking capabilities designed to purge malicious software program from compromised techniques.

The replace immediately addresses threats highlighted in a July 2025 report from Google’s Menace Intelligence Group (GTIG). Researchers detailed a marketing campaign by a menace actor, tracked as UNC6148, deploying the OVERSTEP malware on end-of-life (EoL) SonicWall SMA 100 units.

OVERSTEP is a complicated user-mode rootkit that allows attackers to keep up persistent entry by hidden elements, set up a reverse shell, and exfiltrate delicate information.

Stolen information can embrace credentials, One-Time Password (OTP) seeds, and certificates, granting the attackers long-term persistence even after firmware updates.

Patch Following Energetic Exploitation

The discharge of this firmware is a crucial step in combating lively exploitation within the wild. The GTIG report famous that the OVERSTEP rootkit was deployed on SMA units nearing their end-of-support date of October 1, 2025.

Whereas Google’s researchers couldn’t definitively decide the preliminary entry vector, they noticed vital overlaps between UNC6148’s actions and incidents involving Abyss ransomware. In earlier assaults, menace actors put in internet shells on SMA home equipment to keep up their foothold regardless of system updates.

SonicWall’s advisory acknowledges the dangers outlined by Google and urges directors to implement the safety measures detailed in a associated July data base article.

The corporate has been actively addressing a sequence of vulnerabilities in its SMA 100 home equipment all year long. In Could 2025, it patched three flaws (CVE-2025-32819, CVE-2025-32820, CVE-2025-32821) that may very well be chained for distant code execution. One other crucial flaw, CVE-2025-40599, was patched in July to forestall authenticated arbitrary file uploads.

SonicWall emphasizes that this new firmware is the first remediation for affected units working variations 10.2.1.15-81sv and earlier. There isn’t a workaround accessible.

The advisory clarifies that the vulnerability doesn’t influence the SonicWall SSL VPN SMA 1000 sequence or SSL-VPN performance working on its firewalls.

Given the lively threats and the approaching end-of-support date for the SMA 100 sequence, organizations are suggested to prioritize this replace to forestall compromise and information exfiltration.

Earlier than upgrading, directors ought to evaluate equipment logs for indicators of compromise, reset all credentials, and reinitialize OTP bindings as a precautionary measure.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Devices, Firmware, Malware, OVERSTEP, Releases, Remove, Rootkit, SMA, SonicWall, Update

Post navigation

Previous Post: 2/3 of Organizations Fear Identity Attacks, But Blind Spots Remain
Next Post: Tata-Owned Jaguar Land Rover Delays Factory Reopening Following Major Cyber Attack

Related Posts

New HTTP/2 MadeYouReset Vulnerability Enables Large-Scale DDoS Attacks Cyber Security News
Smart Electric Vehicles Face Hidden Cyber Vulnerabilities Exposing Drivers to Risks Cyber Security News
Threat Actors Abuse Velociraptor Incident Response Tool to Gain Remote Access Cyber Security News
Researchers Detailed North Korean Threat Actors Technical Strategies to Uncover Illicit Access Cyber Security News
New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control Cyber Security News
10 Best AI penetration Testing Companies in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Beware of Fake Online Speedtest Application With Obfuscated JS Codes
  • Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security
  • Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack
  • Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors
  • Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Beware of Fake Online Speedtest Application With Obfuscated JS Codes
  • Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security
  • Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack
  • Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors
  • Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News