Original Article Text

Click to Toggle View

SonicWall warns customers to reset credentials after breach. SonicWall warned customers today to reset credentials after their firewall configuration backup files were exposed in a security breach that impacted MySonicWall accounts. After detecting the incident, SonicWall has cut off the attackers' access to its systems and has been collaborating with cybersecurity and law enforcement agencies to investigate the attack's impact. "As part of our commitment to transparency, we are notifying you of an incident that exposed firewall configuration backup files stored in certain MySonicWall accounts," the cybersecurity company said on Wednesday. "Access to the exposed firewall configuration files contain information that could make exploitation of firewalls significantly easier for threat actors." The consequences of the incident could be dire, as these exposed backups might give threat actors access to secrets for any or all configured services running on SonicWall devices on their networks. SonicWall has also published detailed guidance to help administrators minimize the risk of an exposed firewall configuration being exploited to access their networks, reconfigure potentially compromised secrets and passwords, and detect possible threat activity within their network. "The following checklist provides a structured approach to ensure all relevant passwords, keys, and secrets are updated consistently. Performing these steps helps maintain security and protect the integrity of your SonicWall environment. The critical items are listed first. All other credentials should be updated at your convenience," the company cautioned. "Please note that the passwords, shared secrets, and encryption keys configured in SonicOS may also need to be updated elsewhere, such as with the ISP, Dynamic DNS provider, email provider, remote IPSec VPN peer, or LDAP/RADIUS server, just to name a few." BleepingComputer reached out to SonicWall with questions about the incident, but a response was not immediately available. In August, SonicWall dismissed reports that the Akira ransomware gang was breaching Gen 7 firewalls with SSLVPN enabled using a potential zero-day exploit, stating that it was actually linked to CVE-2024-40766, a critical SSLVPN access control flaw in SonicOS that was patched in November 2024. Last week, the company's theory was confirmed when the Australian Cyber Security Center (ACSC) and cybersecurity firm Rapid7 confirmed that the Akira ransomware gang is now exploiting the CVE-2024-40766 vulnerability to compromise unpatched SonicWall devices. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.

Daily Brief Summary

DATA BREACH // SonicWall Urges Credential Resets After Firewall Backup Exposure

SonicWall experienced a security breach exposing firewall configuration backup files, prompting a call for credential resets to prevent potential exploitation by threat actors.

The breach affected MySonicWall accounts, potentially compromising secrets for services running on SonicWall devices, increasing the risk of unauthorized access.

In response, SonicWall terminated the attackers' access and is collaborating with cybersecurity and law enforcement agencies to assess the breach's impact.

The company has issued guidance for administrators to update passwords, keys, and secrets, emphasizing the importance of securing all related configurations.

SonicWall advises that updates may also be necessary for external systems such as ISPs, VPNs, and LDAP/RADIUS servers to maintain overall network security.

Previously, concerns over a potential zero-day exploit were linked to CVE-2024-40766, a critical flaw now exploited by the Akira ransomware group on unpatched devices.

This incident underscores the critical need for timely patch management and robust security practices to safeguard network integrity.