Movatterモバイル変換


[0]ホーム

URL:


Sign in / up
The Register

Cyber-crime

Crims bust through SonicWall to grab sensitive config data

Vendor pulls plug on cloud backup feature, urges admins to reset passwords and re-secure devices

iconCarly Page
Thu 18 Sep 2025 //16:15 UTC

SonicWall is telling some customers to reset passwords after attackers broke into its cloud backup service and accessed firewall configuration data.

The network security vendor confirmed the breach inan updated knowledge base article and in a statement toThe Register, saying that it recently detected suspicious activity targeting its cloud backup service for firewalls, which it "confirmed as a security incident in the past few days."

Michael Crean, senior vice president of managed security services at SonicWall, told us that "fewer than 5 percent" of its firewall installed base had preference files accessed, though he declined to give an exact number of customers affected.

"While credentials within the files were encrypted, the files also included information that could make it easier for attackers to potentially exploit the related firewall. We are not presently aware of these files being leaked online by threat actors," Crean said, stressing that the incident was "not ransomware or similar event" but the result of "a series of brute-force attacks aimed at gaining access to the preference files stored in backup."

As soon as the intrusion was confirmed, SonicWall said it immediately disabled the cloud backup feature, rotated internal keys, and implemented what it describes as "infrastructure and process changes" to prevent a repeat, Crean toldThe Register. The company also engaged a "leading third-party IR and consulting firm" to validate its findings and help review affected environments.

Customers using the backup service are instructed to log into MySonicWall, verify their registered device serial numbers, and follow the mitigation guidance provided in the KB article. This includes regenerating keys, changing admin passwords, and re-importing secure configurations. SonicWall support teams have been mobilized to walk impacted customers through the process.

SonicWall says its investigation is ongoing and promised "full transparency," with KB updates landing before any broader public announcements. At the time of writing, the company said it had not seen evidence that the stolen files had been published or weaponized.

The breach piles fresh pressure on firewall vendors after a summer of bad news. Earlier this month, researchers warned that theAkira ransomware crew has been abusing SonicWall gear in post-compromise attacks, exploiting stolen credentials to move laterally across victims' networks. And just last week, researchers disclosed thatat least one SonicWall customer had been storing recovery codes in plaintext, leaving a backdoor open for crooks to regain access even after passwords were changed.

With firewalls increasingly a target for attackers, SonicWall is urging administrators to review their environments and apply the published guidance "as soon as possible." ®


More like these

More about


COMMENTS

More about

More like these

TIP US OFF

Send us news


Other stories you might like

SonicWall breach hits every cloud backup customer after 5% claim goes up in smoke

Affects users regardless of when their backups were created
Cyber-crime9 Oct 2025 |31

Capita fined £14M after 58-hour delay exposed 6.6M records

ICO makes example of outsourcing giant over sluggish cyber response
Cybersecurity Month15 Oct 2025 |30

Scattered Lapsus$ Hunters rage-quit the internet (again), promise to return next year

'We will never stop,' say crooks, despite retiring twice in the space of a month
Cybersecurity Month13 Oct 2025 |5

Data sovereignty: Don't just tick the box, think outside it

How your data strategy can fuel innovation
Sponsored Feature

American Airlines subsidiary Envoy caught in Clop's Oracle EBS raid

Not a good week for Big Red
Cybersecurity Month17 Oct 2025 |3

Microsoft warns of 'payroll pirate' crew looting US university salaries

Crooks phish campus staff, slip into HR systems, and quietly reroute paychecks
Cyber-crime10 Oct 2025 |17

Crims had 3-month head start on defenders in Oracle EBS invasion

The miscreants started their attack all the way back on July 10
Cybersecurity Month9 Oct 2025 |2

Suspected Salt Typhoon snoops lurking in European telco's network

It's Typhoon season…year round
Cybersecurity Month20 Oct 2025 |2

A simple AI prompt saved a developer from this job interview scam

INFOSEC IN BRIEF Plus: Ransomware posing as Teams installer, Cisco 0-day exploit to drop rootkit, and European cops bust SIM-box service
Cybersecurity Month20 Oct 2025 |33

Have I Been Pwned logs 17.6M victims in Prosper breach

P2P lending platform says it could not verify the claims at present
Cyber-crime17 Oct 2025 |4

AI makes phishing 4.5x more effective, Microsoft says

And potentially 50 times more profitable
Cybersecurity Month16 Oct 2025 |9

Nork scammers work the blockchain to steal crypto from job hunters

If someone sends you a coding test, be wary of downloading it
Cybersecurity Month16 Oct 2025 |3

[8]ページ先頭

©2009-2025 Movatter.jp