Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

UNC6148 Backdoors Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit

Posted on July 16, 2025July 16, 2025 By CWS

A menace exercise cluster has been noticed concentrating on fully-patched end-of-life SonicWall Safe Cell Entry (SMA) 100 sequence home equipment as a part of a marketing campaign designed to drop a backdoor referred to as OVERSTEP.
The malicious exercise, courting again to at the very least October 2024, has been attributed by the Google Risk Intelligence Group (GTIG) to a gaggle it tracks as UNC6148.
The tech big assessed with excessive confidence that the menace actor is “leveraging credentials and one-time password (OTP) seeds stolen throughout earlier intrusions, permitting them to regain entry even after organizations have utilized safety updates.”
“Evaluation of community visitors metadata data means that UNC6148 might have initially exfiltrated these credentials from the SMA equipment as early as January 2025.”
The precise preliminary entry vector used to ship the malware is at present not recognized because of the steps taken by the menace actors to take away log entries. However it’s believed that entry might have been gained by means of the exploitation of recognized safety flaws reminiscent of CVE-2021-20035, CVE-2021-20038, CVE-2021-20039, CVE-2024-38475, or CVE-2025-32819.
Alternately, the tech big’s menace intelligence crew theorized that the administrator credentials might’ve been obtained by means of information-stealing logs or acquired from credential marketplaces. Nevertheless, it mentioned it did not discover any proof to again up this speculation.

Upon gaining entry, the menace actors have been discovered to ascertain an SSL-VPN session and spawn a reverse shell, though how this was achieved stays a thriller on condition that shell entry shouldn’t be potential by design on these home equipment. It is believed that it could have been pulled off by the use of a zero-day flaw.
The reverse shell is used to run reconnaissance and file manipulation instructions, to not point out export and import settings to the SMA equipment, suggesting that UNC6148 might have altered an exported settings file offline to incorporate new guidelines in order that their operations aren’t interrupted or blocked by the entry gateways.
The assaults culminate within the deployment of a beforehand undocumented implant named OVERSTEP that is able to modifying the equipment’s boot course of to take care of persistent entry, in addition to credential theft and concealing its personal elements to evade detection by patching numerous file system-related features.

That is achieved by implementing a usermode rootkit by means of the hijacked commonplace library features open and readdir, permitting it to cover the artifacts related to the assault. The malware additionally hooks into the write API perform to obtain instructions from an attacker-controlled server within the type of embedded inside net requests –

dobackshell, which begins a reverse shell to the required IP handle and port
dopasswords, which creates a TAR archive of the recordsdata /tmp/temp.db, /and so forth/EasyAccess/var/conf/persist.db, and /and so forth/EasyAccess/var/cert, and put it aside within the location “/usr/src/EasyAccess/www/htdocs/” in order that it may be downloaded through an internet browser

“UNC6148 modified the official RC file ‘/and so forth/rc.d/rc.fwboot’ to realize persistence for OVERSTEP,” GTIG mentioned. “The adjustments meant that every time the equipment was rebooted, the OVERSTEP binary can be loaded into the working file system on the equipment.”
As soon as the deployment step is full, the menace actor then proceeds to clear the system logs and reboots the firewall to activate the execution of the C-based backdoor. The malware additionally makes an attempt to take away the command execution traces from completely different log recordsdata, together with httpd.log, http_request.log, and inotify.log.
“The actor’s success in hiding their tracks is basically as a consequence of OVERSTEP’s functionality to selectively delete log entries [from the three log files],” Google mentioned. “This anti-forensic measure, mixed with an absence of shell historical past on disk, considerably reduces visibility into the actor’s secondary targets.”
Google has evaluated with medium confidence that UNC6148 might have weaponized an unknown, zero-day distant code execution vulnerability to deploy OVERSTEP on focused SonicWall SMA home equipment. Moreover, it is suspected that the operations are carried out with the intent to facilitate knowledge theft and extortion operations, and even ransomware deployment.

This connection stems from the truth that one of many organizations that was focused by UNC6148 was posted on the information leak web site operated by World Leaks, an extortion gang run by people beforehand related to the Hunters Worldwide ransomware scheme. It is price noting that Hunters Worldwide not too long ago shuttered its legal enterprise.
Based on Google, UNC6148 displays tactical overlaps with prior exploitation of SonicWall SMA gadgets noticed in July 2023 that concerned an unknown menace actor deploying an internet shell, a hiding mechanism, and a method to make sure persistence throughout firmware upgrades, per Truesec.
The exploitation exercise was subsequently linked by safety researcher Stephan Berger to the deployment of the Abyss ransomware.
The findings as soon as once more spotlight how menace actors are more and more specializing in edge community techniques that are not normally lined by widespread safety instruments like Endpoint Detection and Response (EDR) or antivirus software program and slip into goal networks unnoticed.
“Organizations ought to purchase disk photos for forensic evaluation to keep away from interference from the rootkit anti-forensic capabilities. Organizations may have to interact with SonicWall to seize disk photos from bodily home equipment,” Google mentioned.

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Backdoors, Devices, FullyPatched, OVERSTEP, Rootkit, Series, SMA, SonicWall, UNC6148

Post navigation

Previous Post: Compumedics Ransomware Attack Led to Data Breach Impacting 318,000
Next Post: United Natural Foods Projects Up to $400M Sales Hit from June Cyberattack

Related Posts

The Hidden Weaknesses in AI SOC Tools that No One Talks About The Hacker News
RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer The Hacker News
SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks The Hacker News
Learn a Smarter Way to Defend Modern Applications The Hacker News
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks The Hacker News
The Unusual Suspect: Git Repos The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Weaponize WordPress Websites to Redirect Visitors to Malicious Websites
  • Microsoft Teams Call Weaponized to Deploy and Execute Matanbuchus Ransomware
  • Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms
  • Europol-Coordinated Global Operation Takes Down Pro-Russian Cybercrime Network
  • Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Weaponize WordPress Websites to Redirect Visitors to Malicious Websites
  • Microsoft Teams Call Weaponized to Deploy and Execute Matanbuchus Ransomware
  • Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms
  • Europol-Coordinated Global Operation Takes Down Pro-Russian Cybercrime Network
  • Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News