Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cyberattackers Penetrate Networks Using SonicWall SSLVPN Credentials

Cyberattackers Penetrate Networks Using SonicWall SSLVPN Credentials

Posted on February 5, 2026 By CWS

Cyberattackers Exploit SonicWall SSLVPN Vulnerabilities

Recently, cybercriminals have been exploiting vulnerabilities in SonicWall SSLVPN credentials to breach networks, deploying an advanced ‘EDR killer’ to bypass endpoint security systems. This sophisticated attack targets organizations’ defenses, highlighting significant security challenges.

Initial Access via Compromised Credentials

In early February 2026, Huntress analyzed a campaign where attackers gained entry using legitimate VPN credentials. They circumvented typical brute-force methods by leveraging a Bring Your Own Vulnerable Driver (BYOVD) attack with a revoked Guidance Software forensic driver.

This strategy enabled attackers to disable essential security processes at the kernel level, bypassing standard protective measures. The breach commenced when attackers authenticated to a SonicWall SSLVPN with compromised credentials, eliminating the need for forceful entry attempts.

Reconnaissance and Network Mapping Activities

Once inside the network, the attackers quickly began reconnaissance. SonicWall’s Intrusion Prevention System (IPS) detected high-volume activities, such as ICMP ping sweeps and NetBIOS probes. Additionally, the threat actors executed a SYN flood, generating over 370 SYNs per second, to map the internal network environment.

The successful login originated from IP address 69.10.60[.]250, while a failed attempt was recorded from 193.160.216[.]221, wherein the account lacked necessary privileges. This illustrates the attackers’ persistence and tactical approach to network infiltration.

Deployment of EDR Killer

The core aspect of the attack involved deploying a 64-bit Windows executable that installed a malicious kernel driver. The malware authors used a custom encoding tactic, substituting words from a 256-word dictionary to obfuscate the driver payload.

The malware then decoded this text into a valid Windows PE file, dropping it at C:ProgramDataOEMFirmwareOemHwUpd.sys and disguising itself as a legitimate system file. The payload registered as a kernel service, ensuring it survived system reboots.

Exploiting a Windows Driver Signature Enforcement gap, attackers successfully loaded the driver, bypassing revocation checks. This allowed them to terminate processes protected by mechanisms like Protected Process Light (PPL), targeting 59 processes from major security vendors.

Implications and Future Outlook

This attack highlights the critical need for robust security measures against increasingly sophisticated cyber threats. Organizations must ensure their systems are updated and monitor for unusual activities to mitigate such risks. As cyber threats evolve, maintaining strong network defenses and staying informed about emerging vulnerabilities is essential.

Cyber Security News Tags:BYOVD attack, Cyberattack, EDR killer, endpoint security, Huntress, Malware, network security, SonicWall, SSLVPN, Windows driver

Post navigation

Previous Post: Nullify Gains $12.5M to Enhance AI Cybersecurity Solutions
Next Post: Iranian Infy Hackers Reactivate C2 Servers After Internet Blackout

Related Posts

Microsoft SQL Server Vulnerability Allows Attackers to Elevate Privileges over a Network Microsoft SQL Server Vulnerability Allows Attackers to Elevate Privileges over a Network Cyber Security News
RevengeHotels Leveraging AI To Attack Windows Users With VenomRAT RevengeHotels Leveraging AI To Attack Windows Users With VenomRAT Cyber Security News
Critical Dolby Codec Vulnerability Exposes Android Devices to Code Execution Attacks Critical Dolby Codec Vulnerability Exposes Android Devices to Code Execution Attacks Cyber Security News
Hackers Leverage Malicious PyPI Package to Attack Users and Steal Cryptocurrency Details Hackers Leverage Malicious PyPI Package to Attack Users and Steal Cryptocurrency Details Cyber Security News
Hackers Leverage Browser-in-the-browser Tactic to Trick Facebook Users and Steal Logins Hackers Leverage Browser-in-the-browser Tactic to Trick Facebook Users and Steal Logins Cyber Security News
Threat Actors Weaponizing Nezha Monitoring Tool as Remote Access Trojan Threat Actors Weaponizing Nezha Monitoring Tool as Remote Access Trojan Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ShadowSyndicate Adopts Server Transition in Cyber Attacks
  • Substack Data Breach: User Information Leaked by Hacker
  • Cybercrime Trends: Codespaces Exploits and More
  • DragonForce Ransomware Threatens Global Business Security
  • AI Scam Unveils 150 Fake Law Firm Websites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ShadowSyndicate Adopts Server Transition in Cyber Attacks
  • Substack Data Breach: User Information Leaked by Hacker
  • Cybercrime Trends: Codespaces Exploits and More
  • DragonForce Ransomware Threatens Global Business Security
  • AI Scam Unveils 150 Fake Law Firm Websites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark