Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: SonicWall Confirms Cloud Portal Breach Exposes Firewall Configurations
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

SonicWall Confirms Cloud Portal Breach Exposes Firewall Configurations

Highlights

  • SonicWall’s MySonicWall cloud portal was breached, exposing customer firewall backup files.

  • Fewer than 5% of devices with cloud backups had files accessed in brute force attacks.

  • SonicWall advised affected customers to reset credentials and monitor for suspicious activity.

Ethan Moreno
Last updated: 17 September, 2025 - 11:49 pm 11:49 pm
Ethan Moreno 3 hours ago
Share
SHARE

The recent breach of SonicWall’s MySonicWall.com platform has placed a spotlight on the vulnerabilities that can emerge when security vendors manage customer data in the cloud. As organizations increasingly depend on platforms like MySonicWall to streamline firewall management, the risks associated with online storage of sensitive configuration files draw widespread concern. The incident serves as a reminder of the delicate balance between operational convenience and robust cybersecurity, especially within the infrastructure meant to safeguard against online threats.

Contents
What Allowed Threat Actors to Access SonicWall Configuration Files?How Is SonicWall Addressing Customer Risk?Could Broader Issues Threaten the Vendor’s Trustworthiness?

Earlier announcements about SonicWall’s security incidents mostly centered on flaws within their hardware products, which have repeatedly attracted attackers. Previous media discussions highlighted issues exploited by ransomware operators and noted the large number of SonicWall vulnerabilities listed in official government catalogs. Unlike earlier breaches, the latest event involves a direct compromise of SonicWall’s cloud-managed service, a key differentiator likely to affect customer confidence more broadly. Earlier vendor responses emphasized patch management, while the latest occurrence demands new operational precautions and brings to light the ongoing risks linked to storing data in cloud portals.

What Allowed Threat Actors to Access SonicWall Configuration Files?

Security teams at SonicWall began probing atypical platform activity and identified that unauthorized actors accessed backup firewall preference files of fewer than 5% of their install base. These files, although protected with encrypted passwords, contained data which attackers could use to target firewalls more effectively. The company attributed the breach to a series of brute force account attacks on stored backup files rather than an event like ransomware. SonicWall responded by disabling the affected cloud backup functionality, initiating a thorough investigation with a third-party firm, and fortifying existing infrastructure.

Bret Fitzgerald, senior director of global communications at SonicWall, stated, “While the files contained encrypted passwords, they also included information that could make it easier for attackers to potentially exploit firewalls.”

How Is SonicWall Addressing Customer Risk?

Acknowledging the potential risks, SonicWall contacted impacted users and recommended several mitigation steps, including credential resets and careful monitoring for suspicious activity. The company also informed law enforcement and emphasized their intent to maintain transparent, ongoing communication. Customers can verify if their devices were affected by checking their MySonicWall accounts for listed serial numbers.

“This was not a ransomware or similar event for SonicWall, rather this was a series of account-by-account brute force attacks aimed at gaining access to the preference files stored in backup for potential further use by threat actors,” Fitzgerald added.

Could Broader Issues Threaten the Vendor’s Trustworthiness?

Industry analysts argue that breaches impacting vendor-operated systems carry greater consequences than customer-side compromises, as they put the faith in vendor ecosystems at risk. Experts call for heightened obligations for vendors holding critical data and stress the necessity of transparency when such events occur. SonicWall has logged at least fourteen vulnerabilities on official threat catalogs since late 2021, several of which have already been linked to ransomware campaigns. Security experts maintain that while credential resets are urgent, persistent risks will linger as long as threat actors retain access to sensitive architecture details.

Beyond this incident, cloud management options such as MySonicWall carry both efficiency and hazard. The convenience of remote backup and administration must be weighed against the exposure these features present. Organizations opting for cloud-based services may benefit from establishing thorough monitoring protocols, limiting the use of backup features, and demanding rapid, clear responses from vendors following security incidents. Enhanced contractual requirements, independent security audits, and active participation in incident response planning can help organizations reduce their exposure. Given SonicWall’s record of recurring issues, affected users and cybersecurity professionals should remain vigilant and prioritize a diversified security approach that anticipates vendor-side breaches as well as those targeting traditional endpoints.

  • SonicWall’s MySonicWall cloud portal was breached, exposing customer firewall backup files.
  • Fewer than 5% of devices with cloud backups had files accessed in brute force attacks.
  • SonicWall advised affected customers to reset credentials and monitor for suspicious activity.
You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Microsoft Seizes Hundreds of Phishing Domains in Global Takedown

BreachForums Founder Receives Three-Year Prison Sentence After Resentencing

Senators Debate FBI Cyber Staff Cuts as Director Defends Record

Apple Updates Major Devices with Security Patches as iOS 26 Launches

Check Point Expands AI Security Capabilities With Lakera Acquisition

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Tesla Stock Faces Scrutiny as Analysts Debate Its Market Behavior
Next Article Garmin Launches Venu 4, Outpaces Apple Watch with New Features

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Garmin Launches Venu 4, Outpaces Apple Watch with New Features
Wearables
Tesla Stock Faces Scrutiny as Analysts Debate Its Market Behavior
Electric Vehicle
Booking Holdings Drives Connected Trip Strategy With A.I. Partnerships
AI Technology
AI Leaders Shape Industry Power as Risks and Ethics Drive Debate
AI Technology
Tesla Reduces Full Self-Driving Strike Penalty Period for Drivers
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?