Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: SonicWall Firewalls Face Surge in Attacks Exploiting Potential Zero-Day
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

SonicWall Firewalls Face Surge in Attacks Exploiting Potential Zero-Day

Highlights

  • SonicWall Gen 7 firewalls are targeted by ongoing ransomware attacks.

  • SSLVPN vulnerabilities are the suspected entry point for attackers.

  • Disabling SSLVPN and updating security protocols is strongly advised.

Ethan Moreno
Last updated: 6 August, 2025 - 2:49 am 2:49 am
Ethan Moreno 18 hours ago
Share
SHARE

A wave of coordinated cyberattacks has been detected targeting SonicWall Gen 7 firewalls, sparking urgent advisories for customers to disable certain encryption services. Security professionals from several major firms have tracked increased ransomware activity attributed to exploitation of a suspected zero-day flaw within the SSL VPN feature. Organizations relying on SonicWall devices for secure remote access now face heightened risks, with multiple confirmed breaches occurring even where multi-factor authentication had been enabled. The latest incidents draw attention to persistent security challenges in firewall products relied upon across diverse industries.

Contents
How Are Current Attacks Unfolding?What Role Does SSL VPN Play in the Exploits?Are Multiple Attacker Groups Involved in the Breaches?

Reports released over the past year highlighted SonicWall’s recurring security vulnerabilities, with numerous entries in official exploited vulnerability catalogs. Past attacks typically centered on SonicWall Secure Mobile Access (SMA) 100 series devices, whereas attackers now focus on newer Gen 7 firewalls. Unlike previous breaches which mostly targeted outdated devices or publicized flaws, the current tactic leverages an apparently unknown vulnerability, enabling threat actors to bypass standard protective controls. This progression indicates that adversaries continue to evolve tactics in response to security improvements, presenting ongoing hurdles for defenders.

How Are Current Attacks Unfolding?

The recent surge in malicious activity began around July 15, with organizations encountering rapid post-compromise escalation and near-daily attack bursts since July 25. Analysts from Huntress and Arctic Wolf noted automation tools combined with hands-on intrusion, including the abuse of privileged accounts and disabling of security defenses prior to the deployment of Akira ransomware. Attackers have managed lateral movement within targeted networks, gaining access to domain controllers within a matter of hours.

What Role Does SSL VPN Play in the Exploits?

The core method of attack hinges on vulnerabilities within the SSLVPN service on SonicWall’s Gen 7 firewalls. SonicWall directed customers to disable SSLVPN capabilities while an internal investigation progresses.

“If a new vulnerability is confirmed, we will release updated firmware and guidance as quickly as possible,”

stated Bret Fitzgerald, senior director at SonicWall. The SSLVPN has been connected to several earlier critical vulnerabilities, indicating its ongoing attractiveness as a target for cybercriminals.

Are Multiple Attacker Groups Involved in the Breaches?

Researchers observed both overlapping and divergent attack tactics during the breaches, suggesting involvement by multiple threat groups or adaptive strategies by a single actor adjusting per incident. Arctic Wolf commented on a financially motivated threat actor deploying Akira ransomware, with Mandiant’s Charles Carmakal addressing the unusual speed and scale:

“The speed and scale of the compromises suggests a potential zero-day vulnerability in SonicWall Gen 7 firewalls.”

The continuing investigation seeks to clarify the full scope and origin of these coordinated attacks.

The recurrence of critical vulnerabilities within SonicWall’s products, most recently the attack vector in the Gen 7 firewall’s SSLVPN, raises questions regarding the sustainability of relying solely on VPN-based perimeter security. Enterprises might consider increased network segmentation and layered security measures to reduce risk exposure from future unexpected flaws. Monitoring vendor advisories and participating in rapid patch adoption remains a core best practice. Given the history of remote access product exploitation, organizations should assess remote connectivity dependencies and incorporate alternative secure access models where feasible.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Federal Agencies Tackle Security by Strengthening Identity Management

Google Issues August Patch to Fix Six Android Flaws

Vietnamese Hackers Target Global Victims Using PaxStealer Malware

Global Authorities Seize BlackSuit Ransomware Infrastructure

CrowdStrike Identifies Surge in North Korean IT Infiltration

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Rivian Challenges Ohio Over Tesla’s Advantage in Direct Car Sales
Next Article Wordle Releases Groan as Puzzle Answer, Players Seek New Strategies

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Tesla Targets Major FSD Leap With New Model, Testing Nears End
Electric Vehicle
Experts Warn AI Hype Weakens Crucial Human Skills
AI
Tesla Adds Smart Warning Feature to Cybertruck Towing System
Electric Vehicle
Generative AI Matures as Enterprises Prioritize Scalable Adoption in 2025
AI
Tesla Begins Road Tests for Extended Model Y L in China
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?