Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation

Posted on August 5, 2025August 5, 2025 By CWS

A just lately noticed surge in ransomware assaults focusing on SonicWall firewalls for preliminary entry suggests {that a} potential zero-day vulnerability is exploited, safety researchers warn.

Google Risk Intelligence Group (GTIG) was the primary to warn of the brand new wave of exercise in mid-July, when it famous that login data stolen in earlier assaults was possible used to compromise SonicWall home equipment that had been totally patched towards recognized vulnerabilities.

As a part of the noticed incidents, the menace actors had been deploying a brand new backdoor/user-mode rootkit dubbed Overstep, which was designed to change the gadget’s boot course of for persistence and knowledge theft.

On the similar time, GTIG famous that the menace actor behind the assaults, tracked as UNC6148, “could have used an unknown zero-day distant code execution vulnerability to deploy Overstep on opportunistically focused SonicWall SMA home equipment”.

In early August, cybersecurity companies Arctic Wolf and Huntress issued contemporary alerts on cyberattacks focusing on SonicWall home equipment to bypass MFA, and SonicWall acknowledged the surge in exercise, noting it was trying into the potential exploitation of a zero-day.

“We’re actively investigating these incidents to find out whether or not they’re linked to a beforehand disclosed vulnerability or if a brand new vulnerability could also be accountable,” SonicWall stated on Monday.

Arctic Wolf stated it has noticed assaults involving VPN entry via SonicWall SSL VPNs, and that collected proof factors to a zero-day flaw.

“In some cases, totally patched SonicWall units had been affected following credential rotation. Regardless of TOTP MFA being enabled, accounts had been nonetheless compromised in some cases,” the corporate stated.Commercial. Scroll to proceed studying.

Huntress too warns of profitable assaults towards home equipment with MFA enabled, noting that the menace actors had been seen pivoting to area controllers inside hours after preliminary entry.

“Throughout our investigation into telemetry associated to this exercise, we’ve discovered proof to counsel that this compromise could also be restricted to TZ and NSa-series SonicWall firewalls with SSLVPN enabled. We are able to affirm that the suspected vulnerability exists in firmware variations 7.2.0-7015 and earlier,” Huntress stated.

The marketing campaign is focusing on Gen 7 SonicWall firewalls with SSLVPN enabled, and SonicWall recommends that clients disable SSLVPN providers, restrict the SSLVPN connectivity to trusted IPs, allow safety providers to detect menace exercise, implement MFA, take away unused accounts, and make sure that all passwords are up to date.

“Please stay vigilant and apply the above mitigations instantly to cut back publicity whereas we proceed our investigation,” SonicWall famous.

Associated: SonicWall Patches Crucial SMA 100 Vulnerability, Warns of Current Malware Assault

Associated: Apple Patches Safari Vulnerability Flagged as Exploited Towards Chrome

Associated: Excessive-Severity Flaws Patched in Chrome, Firefox

Associated: New ‘ResolverRAT’ Concentrating on Healthcare, Pharmaceutical Organizations

Security Week News Tags:Exploitation, Firewall, Hunts, SonicWall, Surge, ZeroDay

Post navigation

Previous Post: 15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign
Next Post: Critical Android System Component Vulnerability Let Attackers Execute Remote Code without User Interaction

Related Posts

In Other News: $30k Google Cloud Build Flaw, Louis Vuitton Breach Update, Attack Surface Growth Security Week News
Russian APT Hits Ukrainian Government With New Malware via Signal Security Week News
160,000 Impacted by Valsoft Data Breach Security Week News
Reclaiming Control: How Enterprises Can Fix Broken Security Operations Security Week News
Empirical Security Raises $12 Million for AI-Driven Vulnerability Management Security Week News
Hawaiian Airlines Hacked as Aviation Sector Warned of Scattered Spider Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Black Hat USA 2025 – Summary of Vendor Announcements (Part 1)
  • How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents
  • Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability
  • Famous Chollima APT Hackers Attacking Job Seekers and Organization to Deploy JavaScript Based Malware
  • Fashion Giant Chanel Hacked in Wave of Salesforce Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Black Hat USA 2025 – Summary of Vendor Announcements (Part 1)
  • How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents
  • Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability
  • Famous Chollima APT Hackers Attacking Job Seekers and Organization to Deploy JavaScript Based Malware
  • Fashion Giant Chanel Hacked in Wave of Salesforce Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News