Article Details
Scrape Timestamp (UTC): 2025-10-09 14:15:18.078
Original Article Text
Click to Toggle View
SonicWall: Firewall configs stolen for all cloud backup customers. SonicWall has confirmed that all customers that used the company's cloud backup service are affected by the security breach last month. Previously, the vendor stated that the incident "exposed firewall configuration backup files stored in certain MySonicWall accounts," without sharing additional details. MySonicWall is an online customer portal used for managing product access, licensing, registration, firmware updates, support cases, and cloud backups of firewall configurations (.EXP files). On September 17, the company warned customers to reset their MySonicWall account credentials to protect their firewall configuration backup files that could be potentially accessed by unauthorized actors who had breached its systems. "Access to the exposed firewall configuration files contain information that could make exploitation of firewalls significantly easier for threat actors," warned SonicWall at the time, also publishing detailed remediation guidance. At the time, SonicWall specified that roughly 5% of its firewall customers use its cloud backup service. In an update published yesterday the vendor said that the incident impacts all customers who used its cloud backup portal to store firewall configuration files. "SonicWall has completed its investigation, conducted in collaboration with leading IR Firm, Mandiant, into the scope of a recent cloud backup security incident," reads the updated bulletin. "The investigation confirmed that an unauthorized party accessed firewall configuration backup files for all customers who have used SonicWall's cloud backup service." The exposed files contain AES-256-encrypted credentials and configuration data. Users can now check if their devices are among the impacted ones by logging into MySonicWall and going to 'Product Management → Issue List.' If any action items are pending review there, users should follow the Essential Credential Reset steps, prioritizing active, internet-facing firewalls. Although SonicWall has stated that the investigation is now complete, it would be prudent for system administrators to continue monitoring MySonicWall alerts periodically for updated lists of affected devices. The Security Validation Event of the Year: The Picus BAS Summit Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation. Don't miss the event that will shape the future of your security strategy
Daily Brief Summary
SonicWall confirmed a breach affecting all customers using its cloud backup service, exposing firewall configuration backup files to unauthorized access.
The breach involves MySonicWall accounts, a portal for managing product access and cloud backups, impacting operational security for users.
Exposed files contain AES-256-encrypted credentials and configuration data, potentially easing exploitation of firewalls by threat actors.
SonicWall collaborated with Mandiant to investigate the breach, advising customers to reset account credentials and follow remediation guidance.
Approximately 5% of SonicWall's firewall customers use the cloud backup service, but all such users are now confirmed affected by this incident.
Customers can verify if their devices are impacted by checking the 'Product Management → Issue List' on MySonicWall.
Continuous monitoring of MySonicWall alerts is recommended for updated information on affected devices and further protective actions.