Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»All SonicWall Cloud Backup Users Have Firewall Configuration Files Sto
Cyber Security

All SonicWall Cloud Backup Users Have Firewall Configuration Files Sto

Team-CWDBy Team-CWDOctober 9, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


SonicWall has confirmed that an unauthorized actor has accessed firewall configuration backup files for all customers who have used its cloud backup service.

The accessed backup files contain encrypted credentials and configuration data.

“While encryption remains in place, possession of these files could increase the risk of targeted attacks,” the firm noted in the blog updated on October 8.

It is understood that access to the firewall configuration backup files was gained through brute-force attacks. The purpose of the hack appears to have been to use the stolen information for future cyber-attacks.

Suspicious activity targeting the firewall cloud backup service was first detected in early September 2025.

The cybersecurity vendor then disclosed the incident on September 17, warning that threat actors accessed firewall preference files stored in the cloud for around 5% of SonicWall’s firewall install base.

After completing its investigation, in collaboration with Mandiant, SonicWall said it is now working to notify all impacted partners and customers.

“We urge all partners and customers to log in and check for their devices. SonicWall has implemented additional security hardening measures and is working closely with Mandiant to further enhance its cloud infrastructure and monitoring systems,” SonicWall said.

Updated Remediation Tools and Advice

The company said it has released tools to assist with device assessment and remediation.

Customers can view the updated final lists of impacted firewalls in the MySonicWall portal, by to the Product Management > Issue List.

Each device has been assigned a priority level to help customers prioritize remediation efforts. These are:

  1. Active – High Priority: devices with internet-facing services enabled
  2. Active – Lower Priority: devices without internet-facing services
  3. Inactive: devices that have not pinged home for 90 days

Containment and remediation actions should then be taken for listed firewalls, following SonicWall guidance. Security teams should first disable or restrict access to services from WAN.

They should then review and update credentials that were enabled at, or before, the time of backup for each firewall device.

For customers who have used the SonicWall cloud backup feature but cannot see their serial numbers in the portal, SonicWall will provide additional guidance in the coming days.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleClayRat Spyware Campaign Targets Android Users in Russia
Next Article New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Look out for phony verification pages spreading malware

September 14, 2025

Chronology of a Skype attack

February 5, 2026

How chatbots can help spread scams

October 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.