Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported

Posted on August 5, 2025August 5, 2025 By CWS

Aug 05, 2025Ravie LakshmananZero-Day / Community Safety
SonicWall stated it is actively investigating stories to find out if there’s a new zero-day vulnerability following stories of a spike in Akira ransomware actors in late July 2025.
“Over the previous 72 hours, there was a notable improve in each internally and externally reported cyber incidents involving Gen 7 SonicWall firewalls the place SSLVPN is enabled,” the community safety vendor stated in a press release.
“We’re actively investigating these incidents to find out whether or not they’re related to a beforehand disclosed vulnerability or if a brand new vulnerability could also be accountable.”

Whereas SonicWall is digging deeper, organizations utilizing Gen 7 SonicWall firewalls are suggested to observe the steps beneath till additional discover –

Disable SSL VPN providers the place sensible
Restrict SSL VPN connectivity to trusted IP addresses
Activate providers corresponding to Botnet Safety and Geo-IP Filtering
Implement multi-factor authentication
Take away inactive or unused native consumer accounts on the firewall, notably these with SSL VPN entry
Encourage common password updates throughout all consumer accounts

The event comes shortly after Arctic Wolf revealed it had recognized a surge in Akira ransomware exercise focusing on SonicWall SSL VPN units for preliminary entry since late final month.
Huntress, in a follow-up evaluation printed Monday, additionally stated it has noticed risk actors pivoting on to area controllers merely a couple of hours after the preliminary breach.
Assault chains start with the breach of the SonicWall equipment, adopted by the attackers taking a “well-worn” post-exploitation path to conduct enumeration, detection evasion, lateral motion, and credential theft.

The incidents additionally contain the dangerous actors methodically disabling Microsoft Defender Antivirus and deleting quantity shadow copies previous to deploying Akira ransomware.
Huntress stated it detected round 20 completely different assaults tied to the newest assault wave beginning on July 25, 2025, with variations noticed within the tradecraft used to tug them off, together with in the usage of instruments for reconnaissance and persistence, corresponding to AnyDesk, ScreenConnect, or SSH.
There may be proof to counsel that the exercise could also be restricted to TZ and NSa-series SonicWall firewalls with SSL VPN enabled, and that the suspected flaw exists in firmware variations 7.2.0-7015 and earlier.
“The pace and success of those assaults, even in opposition to environments with MFA enabled, strongly counsel a zero-day vulnerability is being exploited within the wild,” the cybersecurity firm stated. “It is a vital, ongoing risk.”

The Hacker News Tags:Attacks, Investigating, Potential, Reported, SonicWall, SSL, Targeted, VPN, ZeroDay

Post navigation

Previous Post: How to Secure a Web Application Firewall (WAF)
Next Post: Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code

Related Posts

EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware The Hacker News
Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability The Hacker News
Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access The Hacker News
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks The Hacker News
Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi The Hacker News
North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports
  • Phishing Attacks Using AI-Powered Platforms to Misleads Users and Evades Security Tools
  • UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware
  • Top 10 Best API Security Testing Tools in 2025
  • Nokia CBIS/NCS Manager API Vulnerability Let Attackers Bypass Authentication

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports
  • Phishing Attacks Using AI-Powered Platforms to Misleads Users and Evades Security Tools
  • UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware
  • Top 10 Best API Security Testing Tools in 2025
  • Nokia CBIS/NCS Manager API Vulnerability Let Attackers Bypass Authentication

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News