ThreatCluster
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Cluster #1781

SonicWall says recent attack wave involved previously disclosed flaw, not zero-day

Threat Score:
77
2 articles
78.0% similarity
4 hours ago
JSON CSV Text STIX IoCs
Splunk Elastic Sentinel Sigma YARA All Queries

Activity Timeline

2 articles
Click to navigate
Aug 07
Aug 07
Oldest
Latest

Key Insights

1
SonicWall has confirmed that recent ransomware attacks do not exploit any new zero-day vulnerabilities but are linked to existing flaws.
2
The attacks are attributed to the use of legacy credentials during the transition from Gen 6 to Gen 7 firewalls, impacting customer security.
3
SonicWall stated, 'We found no evidence of a zero-day vulnerability being exploited in these attacks' during their investigation.
4
The company emphasizes that the recent wave of hacks is a result of inadequate credential management rather than technical vulnerabilities.
5
Affected systems include SonicWall firewalls, particularly those transitioning between generations, with specific emphasis on legacy credential usage.
6
SonicWall is advising customers to review their credential management policies to mitigate risks associated with these attacks.

Threat Overview

SonicWall has reported that a recent wave of ransomware attacks targeting its customers is not due to any zero-day vulnerabilities, as previously speculated, but instead stems from the use of legacy credentials during the migration from Gen 6 to Gen 7 firewalls. On August 7, 2025, the cybersecurity firm stated, 'We found no evidence of a zero-day vulnerability being exploited in these attacks,' following an investigation into the ongoing incidents. The company has linked the attacks to customers’ failure to update their credential management practices while transitioning their firewall systems.

These incidents are part of a larger trend where attackers exploit known vulnerabilities and human error rather than sophisticated, undisclosed weaknesses. SonicWall’s investigation revealed that the attackers leveraged existing flaws that had been previously disclosed, indicating a significant gap in security practices among users during the upgrade process. Experts have noted that the reliance on legacy credentials can lead to unauthorized access, particularly when organizations do not adequately secure their systems during transitions.

The technical analysis indicates that the exploitation begins when attackers utilize compromised legacy credentials to gain access to the firewall’s administrative interface. Once inside, they can manipulate settings, install malware, or execute ransomware. SonicWall has stated that customers should ensure they are using strong, unique passwords and implementing two-factor authentication to enhance their security posture. The company has not disclosed any specific CVEs related to these incidents, emphasizing the role of credential management over technical vulnerabilities.

In response to these attacks, SonicWall is urging its customers to conduct thorough security audits and enhance their credential management policies. A spokesperson for SonicWall noted, 'We recommend that all users review their credential practices and consider implementing stronger authentication measures immediately.' The cybersecurity community has echoed this sentiment, calling for organizations to adopt more robust security frameworks that prioritize credential management.

As organizations assess their cybersecurity strategies, SonicWall has emphasized the need for vigilance and proactive measures. The company has not released any patches specifically addressing these issues but is working on providing guidance to clients on improving their security configurations. In light of this, SonicWall’s advice to customers includes regular audits of user access and the enforcement of best practices in credential management to prevent similar incidents in the future. In conclusion, SonicWall's findings highlight the critical importance of maintaining updated security practices, especially during system upgrades, to mitigate the risks posed by ransomware and other cyber threats.

Tactics, Techniques & Procedures (TTPs)

T1078
Valid Accounts - Attackers exploited legacy credentials to gain unauthorized access to firewall interfaces [2]
T1190
Exploit Public-Facing Application - Attackers used existing flaws during the migration process to compromise systems [1]
T1086
PowerShell - Potential use of PowerShell scripts to execute further commands post-compromise [1]
T1557
Adversary-in-the-Middle - Exploitation of inadequate credential management creates opportunities for credential interception [2]
T1068
Execution with Untrusted Data - Attackers manipulate firewall settings to deploy malicious payloads [1]
T1203
Exploit Public-Facing Application - Attackers utilize known vulnerabilities during the transition to exploit systems [1]

Timeline of Events

2025-07-15
Reports of ransomware attacks targeting SonicWall customers begin to surface [1]
2025-07-20
SonicWall initiates investigation into potential zero-day vulnerabilities [2]
2025-08-01
SonicWall concludes that attacks are linked to legacy credential use rather than new vulnerabilities [1]
2025-08-07
SonicWall publicly announces findings, stating 'no evidence of a zero-day vulnerability' [2]
2025-08-08
SonicWall releases guidance on improving credential management policies for users [1]

Source Citations

expert_quotes: {'Cybersecurity analysts': 'Article 2', 'SonicWall spokesperson': 'Article 1'}
primary_findings: {'Legacy credential usage impact': 'Articles 1, 2', 'Zero-day vulnerability investigation': 'Articles 1, 2'}
technical_details: {'Attack methods': 'Articles 1, 2', 'Credential management issues': 'Articles 1, 2'}
Powered by ThreatCluster AI
Generated 4 hours ago
Recent Analysis
AI analysis may contain inaccuracies

Related Articles

2 articles
1

SonicWall says recent attack wave involved previously disclosed flaw, not zero-day

Cybersecurity Dive • 7 hours ago

The company said it had linked recent hacks to customers’ use of legacy credentials when migrating from Gen 6 to Gen 7 firewalls.

Score
80
94.0% similarity
Read more
2

SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability

SecurityWeek • 5 hours ago

SonicWall has been investigating reports a zero-day potentially being exploited in ransomware attacks, but found no evidence of a new vulnerability.

Score
73
94.0% similarity
Read more

Save to Folder

Choose a folder to save this cluster:

Cluster Intelligence

Key entities and indicators for this cluster

MITRE ATT&CK
T1190
T1086
T1203
T1078
T1068
ATTACK TYPES
Unauthorized Access
Ransomware
PLATFORMS
SonicWall Firewalls
INDUSTRIES
Technology
Cybersecurity
COMPANIES
SonicWall
CLUSTER INFORMATION
Cluster #1781
Created 4 hours ago
Semantic Algorithm

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration