Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Nation-State

State-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack

The threat actor stole the firewall configuration files of all SonicWall customers who used the cloud backup service.

SonicWall vulnerability

SonicWall this week revealed that a state-sponsored threat actor was behind the September hack in which firewall configuration files were stolen from its cloud backup service.

The company disclosed the incident in mid-September, saying that the attackers had exfiltrated the backup files of less than 5% of its customers.

In an October 8 update, SonicWall revised that number, saying that all firewall preference files stored using its cloud backup service were stolen.

The files, SonicWall warned, contain encrypted credentials and configuration data. Attackers could use them to launch targeted attacks, it said.

The company urged all customers to check if any firewall backups were listed in their MySonicWall.com accounts, to determine if their devices were at risk, and to reset all passwords, as described in the accompanying containment and mitigation documentation.

SonicWall engaged Mandiant to investigate the attack, and notified all impacted partners and customers about the incident. The investigation, it announced this week, has been completed.

Advertisement. Scroll to continue reading.

“The malicious activity – carried out by a state-sponsored threat actor – was isolated to the unauthorized access of cloud backup files from a specific cloud environment using an API call,” SonicWall said.

The company also underlined that the attack is unrelated to the recent wave of Akira ransomware intrusions targeting SonicWall firewalls and other edge devices.

“The incident did not impact SonicWall products or firmware. No other SonicWall systems or tools, source code, or customer networks were disrupted or compromised,” the company said.

“SonicWall has taken all current remediation actions recommended by Mandiant and will continue working with Mandiant and other third parties for ongoing hardening of our network and cloud infrastructure,” it added.

SonicWall customers are advised to take immediate action to secure their devices. In mid-October, Huntress warned of a widespread campaign targeting SonicWall SSL VPN accounts, in which valid credentials were likely used for compromise across multiple businesses.

The attacks, the cybersecurity firm said, did not appear linked to the cloud backup incident. However, the sensitive information stored in the stolen files poses a high risk for the impacted organizations.

Related: Exploited ‘Post SMTP’ Plugin Flaw Exposes WordPress Sites to Takeover

Related: Transportation Companies Hacked to Steal Cargo

Related: SonicWall Updates SMA 100 Appliances to Remove Overstep Malware

Related: On Demand: Threat Detection & Incident Response (TDIR) Summit

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Remedio has appointed of Cynthia Stanton as Chief Marketing Officer.

Jacki Monson has joined CVS Health as SVP, Deputy CISO.

Gigi Schumm has been promoted to Chief Revenue Officer at Securonix.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.