Article Details
Scrape Timestamp (UTC): 2025-11-06 05:46:50.590
Source: https://thehackernews.com/2025/11/sonicwall-confirms-state-sponsored.html
Original Article Text
Click to Toggle View
SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach. SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure of firewall configuration backup files. "The malicious activity – carried out by a state-sponsored threat actor - was isolated to the unauthorized access of cloud backup files from a specific cloud environment using an API call," the company said in a statement released this week. "The incident is unrelated to ongoing global Akira ransomware attacks on firewalls and other edge devices." The disclosure comes nearly a month after the company said an unauthorized party accessed firewall configuration backup files for all customers who have used the cloud backup service. In September, it claimed that the threat actors accessed the backup files stored in the cloud for less than 5% of its customers. SonicWall, which engaged the services of Google-owned Mandiant to investigate the breach, said it did not affect its products or firmware, or any of its other systems. It also said it has adopted various remedial actions recommended by Mandiant to harden its network and cloud infrastructure, and that it will continue to improve its security posture. "As nation-state–backed threat actors increasingly target edge security providers, especially those serving SMB and distributed environments, SonicWall is committed to strengthening its position as a leader for partners and their SMB customers on the front lines of this escalation," it added. SonicWall customers are advised to log in to MySonicWall.com and check for their devices, and reset the credentials for impacted services, if any. The company has also released an Online Analysis Tool and Credentials Reset Tool to identify services that require remediation and perform credential-related security tasks, respectively.
Daily Brief Summary
SonicWall confirmed state-sponsored actors accessed firewall configuration backup files in a September breach, affecting less than 5% of its cloud backup service customers.
The breach involved unauthorized API calls to a specific cloud environment, with no impact on SonicWall's products, firmware, or other systems.
Google-owned Mandiant was engaged to investigate the breach, leading to the implementation of recommended security enhancements for SonicWall's network and cloud infrastructure.
SonicWall has introduced an Online Analysis Tool and Credentials Reset Tool to assist customers in identifying affected services and securing their credentials.
The company emphasizes its commitment to bolstering security for SMBs and distributed environments, as nation-state threats increasingly target edge security providers.
Customers are advised to log in to MySonicWall.com to verify their devices and reset credentials for any impacted services.