Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»SonicWall Discloses Compromise of Cloud Backup Service
Cyber Security

SonicWall Discloses Compromise of Cloud Backup Service

Team-CWDBy Team-CWDSeptember 18, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Cybersecurity vendor SonicWall has disclosed a security incident affecting its cloud backup service for firewalls.

An investigation found that threat actors successfully accessed firewall preference files stored in the cloud for around 5% of SonicWall’s firewall install base.

The company warned that while the credentials within the files are encrypted, other information is included that could enable attackers to exploit the related firewall in the future. This includes the firewall’s serial number.

“We are not presently aware of these files being leaked online by threat actors. This was not a ransomware or similar event for SonicWall, rather this was a series of brute force attacks aimed at gaining access to the preference files stored in backup for potential further use by threat actors,” SonicWall noted in the advisory published on September 17, and updated on September 18.

To check if they have been impacted by the attack, all SonicWall firewall customers should login to MySonicWall.com and verify if cloud backups are enabled for their products.

If they are, they need to check whether any of their firewall serial numbers are among the information compromised.

“If yes, the listed firewalls are at risk and should follow the containment and remediation guidelines,” SonicWall stated.

Customers whose serial numbers are not included have been told to regularly check the incident page for any additional updates.

Impacted Customers Urged to Take Immediate Action

Due to the sensitivity of the configuration files, impacted customers have been urged to take immediate containment and remediation steps.

They should firstly disable or restrict access to services from WAN before moving onto remediation actions.

For remediation, SonicWall has set out a structured checklist to ensure all relevant passwords, keys and secrets are updated consistently, with critical items listed first.

“Please note that the passwords, shared secrets and encryption keys configured in SonicOS may also need to be updated elsewhere, such as with the ISP, Dynamic DNS provider, email provider, remote IPSec VPN peer, or LDAP/RADIUS server, just to name a few. Failure to do so can cause Internet and/or VPN outages or disruption to certain services such as authentication, log/alert forwarding, etc,” the firm warned.

Logs should also be reviewed for recent configuration changes in firewalls or unusual activity.

Additionally, impacted customers will receive a new preferences file to import onto their firewall. This file randomizes passwords for all local users, randomizes IPSec VPN keys and resets the binding for time-based one-time password (TOTP) if enabled.

The latest incident follows a number of attacks targeting SonicWall products in recent months. The firm recently published an advisory revealing that threat actors were actively exploiting a critical vulnerability in the SonicWall SonicOS management access and SSLVPN.

In August, Arctic Wolf researchers said it had detected multiple pre-ransomware intrusions in SonicWall SSL VPNs, indicating a possible zero day vulnerability.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSAP Patches Critical NetWeaver (CVSS Up to 10.0) and High-Severity S/4HANA Flaws
Next Article New York Blood Center Alerts 194,000 People to Data Breach
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Find your weak spots before attackers do

November 21, 2025

What is it, and how do I get it off my device?

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.