Sonicwall Hacked with Highly Sophisticated Hackers By Exploiting Zero-Day Vulnerabilities

Recently, the cybersecurity researchers reported that SonicWall, the popular internet security provider of firewall and VPN products, on late Friday has become victim to a coordinated attack on its internal systems.

The San Jose-based company affirmed that “highly complex threat actors” attacked its internal systems by exploiting likely zero-day vulnerabilities on specific SonicWall protected remote access products.

However, the threat actors have attacked the secure remote access products such as NetExtender VPN client version 10.x and Secure Mobile Access (SMA). All these products are used to accommodate users with remote access to their internal resources. 

Affected products

The experts have mentioned all the affected products and we have mentioned them below:-

NetExtender VPN client version 10.x (released in 2020) utilized to connect to SMA 100 series devices and SonicWall firewalls.

Secure Mobile Access (SMA) version 10.x operating on SMA 200, SMA 210, SMA 400, SMA 410 physical devices, and the SMA 500v virtual device

Recommendations for SMA 100 series

The NetExtender VPN client and SMB-oriented SMA 100 series are utilized for accommodating employees/users with remote access to internal resources. That’s why, the SMA 1000 series is not sensitive to this vulnerability and employs clients that are different from NetExtender.

  • Utilize a firewall only to allow SSL-VPN connections to the SMA appliance from known/whitelisted IPs.
  • Configure the whitelist access on the SMA directly itself.

Recommendations for firewalls with SSL-VPN access via NetExtender VPN client version 10.x

  • Disable NetExtender access to the firewall or restrict access to users and admins via an allow-list/whitelist for their public IPs.

Moreover, the SonicWall has announced an Urgent Security Notice for NetExtender VPN Client 10.X, SMA 100 Series vulnerability that involves a series of customer instructions.

Along with several cybersecurity vendors like FireEye, Microsoft, Crowdstrike, and Malwarebytes converting the targets of cyberattacks in the track of SolarWinds supply chain hack, the most advanced breach of SonicWall grows significant interests.

Not only this, but SonicWall also supports multi-factor authentication on all SONICWALL SMA, Firewall & MYSONICWALL accounts.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z Series…

2 hours ago

New Trinda Malware Targets Android Devices by Replacing Phone Numbers During Calls

Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware targeting…

2 hours ago

DarkCloud Stealer Uses Weaponized .TAR Archives to Target Organizations and Steal Passwords

A recent cyberattack campaign leveraging the DarkCloud stealer has been identified, targeting Spanish companies and…

2 hours ago

SonicWall Firewall Vulnerability Enables Unauthorized Access

Researchers from Bishop Fox have successfully exploited CVE-2024-53704, an authentication bypass vulnerability that affects SonicWall firewalls.…

2 hours ago

Russian Seashell Blizzard Targets Organizations Using Custom-Built Hacking Tools

Seashell Blizzard, also known as APT44, Sandworm, and Voodoo Bear, has emerged as a sophisticated…

2 hours ago

EvilCorp and RansomHub Collaborate to Launch Worldwide Attacks on Organizations

EvilCorp, a sanctioned Russia-based cybercriminal enterprise, has been observed collaborating with RansomHub, one of the…

2 hours ago