Article Details

Scrape Timestamp (UTC): 2025-09-23 19:43:53.563

Source: https://www.theregister.com/2025/09/23/sonicwall_rootkitbooting_firmware_update/

Original Article Text

Click to Toggle View

SonicWall releases rootkit-busting firmware update following wave of attacks. Security vendor's no good, very bad week year SonicWall on Monday released a firmware update that the security vendor says will remove rootkit malware deployed in recent attacks targeting Secure Mobile Access (SMA) 100 appliances. The update comes about two months after Google warned that some unknown criminals have been exploiting fully patched, end-of-life SonicWall SMA 100 appliances to deploy a previously unknown backdoor and rootkit dubbed OVERSTEP. The malware modifies the appliance's boot process to maintain persistent access, enabling the criminals to steal sensitive credentials and conceal their own components.  The Chocolate Factory's intel analysts in July attributed the ongoing campaign to UNC6148 - UNC in Google's threat-group naming taxonomy stands for "Uncategorized."  In its Monday advisory, the security appliance maker pointed to Google's earlier threat report about UNC6148 targeting SMA 100 appliances and dropping the never-before-seen rootkit.  "SonicWall strongly recommends that users of the SMA 100 series products (SMA 210, 410, and 500v) upgrade to the 10.2.2.2-92sv version," the vendor said. This rootkit-busting firmware update follows a series of other attacks targeting the firewall and VPN maker, whose products have been exploited in recent months for ransomware infections as well as credential- and data-stealing campaigns. Also on Monday, SonicWall and the US Cybersecurity and Infrastructure Security Agency (CISA) warned of brute-force attacks targeting its cloud backup service for firewalls, following The Register's report last week about the intrusions. Additionally, CISA urged all SonicWall customers to log into their accounts and verify if their devices are at risk. Last Thursday, SonicWall senior VP Michael Crean told us that, during these intrusions, digital thieves accessed firewall configuration data belonging to "fewer than 5 percent" of its firewall installed base, and the vendor again repeated this figure in its Monday update about the cloud backup service security snafu. Prior to that, in August, SonicWall confirmed that it was investigating a wave of ransomware activity targeting its firewall devices. It turns out that Akira ransomware affiliates were behind these attacks, tied to CVE-2024-40766. This is a 9.8 CVSS-rated improper access control flaw originally disclosed in August 2024 - that Akira also abused last year to gain initial access to victim orgs before deploying ransomware and extorting the infected firms for ransom payments. Earlier this month, Rapid7 security analysts warned that Akira was also poking holes in SonicWall SSLVPN misconfigurations and exploiting these weaknesses, in addition to the year-old CVE, to conduct its ransomware attacks.

Daily Brief Summary

VULNERABILITIES // SonicWall Releases Critical Firmware Update to Combat Rootkit Attacks

SonicWall has issued a firmware update for SMA 100 appliances to counteract a rootkit malware named OVERSTEP, which has been used to exploit fully patched, end-of-life devices.

The rootkit alters the boot process of the appliances, allowing attackers to maintain persistent access and steal sensitive credentials, posing significant security risks.

Google's threat analysis identified the campaign as the work of UNC6148, an uncategorized threat group, highlighting the ongoing threat to SonicWall's products.

SonicWall and CISA have also warned of brute-force attacks on SonicWall's cloud backup service, urging customers to verify their device security.

SonicWall's recent challenges include ransomware attacks linked to Akira affiliates, exploiting a high-severity CVE-2024-40766 vulnerability in their firewall devices.

The company advises users to upgrade to firmware version 10.2.2.2-92sv to mitigate these threats and protect their systems from further exploitation.

These incidents underscore the importance of timely patch management and vigilant monitoring of security advisories to safeguard critical infrastructure.