Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cyberattackers Penetrate Networks Using SonicWall SSLVPN Credentials

Cyberattackers Penetrate Networks Using SonicWall SSLVPN Credentials

Posted on February 5, 2026 By CWS

Cyberattackers Exploit SonicWall SSLVPN Vulnerabilities

Recently, cybercriminals have been exploiting vulnerabilities in SonicWall SSLVPN credentials to breach networks, deploying an advanced ‘EDR killer’ to bypass endpoint security systems. This sophisticated attack targets organizations’ defenses, highlighting significant security challenges.

Initial Access via Compromised Credentials

In early February 2026, Huntress analyzed a campaign where attackers gained entry using legitimate VPN credentials. They circumvented typical brute-force methods by leveraging a Bring Your Own Vulnerable Driver (BYOVD) attack with a revoked Guidance Software forensic driver.

This strategy enabled attackers to disable essential security processes at the kernel level, bypassing standard protective measures. The breach commenced when attackers authenticated to a SonicWall SSLVPN with compromised credentials, eliminating the need for forceful entry attempts.

Reconnaissance and Network Mapping Activities

Once inside the network, the attackers quickly began reconnaissance. SonicWall’s Intrusion Prevention System (IPS) detected high-volume activities, such as ICMP ping sweeps and NetBIOS probes. Additionally, the threat actors executed a SYN flood, generating over 370 SYNs per second, to map the internal network environment.

The successful login originated from IP address 69.10.60[.]250, while a failed attempt was recorded from 193.160.216[.]221, wherein the account lacked necessary privileges. This illustrates the attackers’ persistence and tactical approach to network infiltration.

Deployment of EDR Killer

The core aspect of the attack involved deploying a 64-bit Windows executable that installed a malicious kernel driver. The malware authors used a custom encoding tactic, substituting words from a 256-word dictionary to obfuscate the driver payload.

The malware then decoded this text into a valid Windows PE file, dropping it at C:ProgramDataOEMFirmwareOemHwUpd.sys and disguising itself as a legitimate system file. The payload registered as a kernel service, ensuring it survived system reboots.

Exploiting a Windows Driver Signature Enforcement gap, attackers successfully loaded the driver, bypassing revocation checks. This allowed them to terminate processes protected by mechanisms like Protected Process Light (PPL), targeting 59 processes from major security vendors.

Implications and Future Outlook

This attack highlights the critical need for robust security measures against increasingly sophisticated cyber threats. Organizations must ensure their systems are updated and monitor for unusual activities to mitigate such risks. As cyber threats evolve, maintaining strong network defenses and staying informed about emerging vulnerabilities is essential.

Cyber Security News Tags:BYOVD attack, Cyberattack, EDR killer, endpoint security, Huntress, Malware, network security, SonicWall, SSLVPN, Windows driver

Post navigation

Previous Post: Nullify Gains $12.5M to Enhance AI Cybersecurity Solutions
Next Post: Iranian Infy Hackers Reactivate C2 Servers After Internet Blackout

Related Posts

Critical Chaos Mesh Vulnerabilities Let Attackers Takeover Kubernetes Cluster Critical Chaos Mesh Vulnerabilities Let Attackers Takeover Kubernetes Cluster Cyber Security News
Singularity Linux Kernel Rootkit with New Feature Prevents Detection Singularity Linux Kernel Rootkit with New Feature Prevents Detection Cyber Security News
Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character Cyber Security News
New Malware Spotted in The Wild Using Prompt Injection to Manipulate AI Models Processing Sample New Malware Spotted in The Wild Using Prompt Injection to Manipulate AI Models Processing Sample Cyber Security News
NVIDIA GPU Display Driver Vulnerabilities Allows Code Execution and Privilege Escalation NVIDIA GPU Display Driver Vulnerabilities Allows Code Execution and Privilege Escalation Cyber Security News
Pig-Butchering Scams Operators Scaled Their Operations with The Support of AI-Assistants Pig-Butchering Scams Operators Scaled Their Operations with The Support of AI-Assistants Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark