InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Experts warn of widespread SonicWall VPN breach affecting over 100 accounts
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Experts warn of widespread SonicWall VPN breach affecting over 100 accounts
Technology

Experts warn of widespread SonicWall VPN breach affecting over 100 accounts

October 11, 2025 4 Min Read
Share

Cybersecurity firm Huntress on Friday warned of a “widespread compromise” of SonicWall SSL VPN devices used to access multiple customer environments.

“Threat actors are rapidly authenticating multiple accounts across compromised devices,” the report said. “The speed and scale of these attacks suggests that the attackers appear to have control over valid credentials rather than brute force attacks.”

The bulk of the activity is said to have started on October 4, 2025, and affected more than 100 SonicWall SSL VPN accounts across 16 customer accounts. In the case Huntress investigated, the SonicWall device authenticated from IP address 202.155.8(.)73.

The company noted that in some cases, the attackers did not perform any further hostilities within the network and severed the connection after a short period of time. However, in other cases, attackers have been found conducting network scanning activities and attempting to access numerous local Windows accounts.

This disclosure comes shortly after SonicWall admitted that a security incident resulted in the unauthorized disclosure of firewall configuration backup files stored in MySonicWall accounts. According to the latest update, this breach affects all customers who used SonicWall’s cloud backup service.

“Firewall configuration files store sensitive information that can be exploited by threat actors to exploit or gain access to an organization’s network,” said Arctic Wolf. “These files can provide an attacker with sensitive information such as user, group, and domain settings, DNS and logging settings, and certificates.”

However, Huntress noted that at this stage there is no evidence linking this breach to the recent spike in breaches.

See also  Nation-state hackers deploy new Airstalk malware in suspected supply chain attack

Considering that sensitive credentials are stored within firewall configurations, organizations using the MySonicWall cloud configuration backup service are recommended to reset credentials on live firewall devices to avoid unauthorized access.

We also recommend restricting WAN management and remote access when possible, revoking external API keys that touch firewalls and management systems, monitoring logins for signs of suspicious activity, and enforcing multi-factor authentication (MFA) for all administrator and remote accounts.

This disclosure comes amid an increase in ransomware activity targeting SonicWall firewall devices for initial access, with the attack leveraging a known security flaw (CVE-2024-40766) to infiltrate target networks deploying Akira ransomware.

In a report released this week, Darktrace said it detected an intrusion targeting an anonymous U.S. customer in late August 2025 that included network scanning, reconnaissance, lateral movement, privilege escalation using techniques such as UnPAC hashing, and data theft.

“One of the compromised devices was later determined to be a SonicWall virtual private network (VPN) server, suggesting this incident was part of a broader Akira ransomware campaign targeting SonicWall technology,” the report said.

“This campaign by the Akira ransomware attackers highlights the critical importance of maintaining up-to-date patching methods. Threat actors continue to exploit previously disclosed vulnerabilities, not just zero-days, highlighting the need for continued vigilance even after patches are released.”

Share This Article
Twitter Copy Link
Previous Article Anime Chef Code October 2025 Anime Chef Code October 2025
Next Article Is Austin Beutner preparing to run against Mayor Karen Bass? It certainly looks like that Is Austin Beutner preparing to run against Mayor Karen Bass? It certainly looks like that

You Might Also Like

Malware Delivery Channels
Technology

North Korean hackers turn JSON service into covert malware delivery channel

3 Min Read
Fake OSINT and GPT utility GitHub repositories spread PyStoreRAT malware payload
Technology

Fake OSINT and GPT utility GitHub repositories spread PyStoreRAT malware payload

6 Min Read
Five people plead guilty in US for helping North Korean IT workers infiltrate 136 companies
Technology

Five people plead guilty in US for helping North Korean IT workers infiltrate 136 companies

7 Min Read
Critical RSC bug in React and Next.js allows unauthenticated remote code execution
Technology

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

2 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?