Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hackers Breach SonicWall Cloud Backup, Exposing Customer Firewall Data
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Hackers Breach SonicWall Cloud Backup, Exposing Customer Firewall Data

Highlights

  • SonicWall confirmed attackers accessed all cloud backup firewall configurations.

  • Researchers say stolen files could aid further targeted cyberattacks.

  • SonicWall has contacted affected users and implemented extra security measures.

Samantha Reed
Last updated: 9 October, 2025 - 11:49 pm 11:49 pm
Samantha Reed 12 hours ago
Share
SHARE

Security fatigue is mounting among businesses as SonicWall, a well-known provider of cybersecurity solutions, disclosed that a brute-force attack compromised its cloud backup system and the firewall configuration files of all customers using this service. This breach not only puts organizations’ sensitive network settings and credentials at risk but also highlights ongoing challenges in protecting cloud-based security infrastructure. Companies that rely on SonicWall’s services are now facing uncertainty about the overall scope and potential repercussions of this incident, fueling debate among IT professionals about industry best practices and vendor accountability.

Contents
How Did Attackers Compromise SonicWall’s Cloud Backup Service?What Information Was Exposed and Why Does It Matter?What Steps Is SonicWall Taking Following the Breach?

Reports from earlier news cycles suggested the breach affected fewer than 5% of the company’s firewall user base, a figure SonicWall had included in its initial response. However, as the investigation evolved, SonicWall removed this statistic from public statements, which raised concerns about the transparency and current understanding of the breach. In contrast to prior, smaller incidents or vulnerability exploits in SonicWall products, this attack targeted the vendor’s internal systems, indicating a significant escalation in threats faced by managed security service providers.

How Did Attackers Compromise SonicWall’s Cloud Backup Service?

The company confirmed that attackers gained unauthorized access to configuration backup files belonging to all users of its cloud backup feature. An investigation with support from Mandiant revealed that a customer-facing SonicWall system was breached via brute-force methods. This access provided attackers with a wealth of sensitive data, ranging from firewall rules and routing information to encrypted credentials.

What Information Was Exposed and Why Does It Matter?

The leak contained a variety of crucial details, such as device configurations and encrypted passwords. Although the credentials were protected, security experts warn that with enough time, attackers could crack weak passwords offline. Ryan Dewhurst, proactive threat intelligence lead at watchTowr, explained:

“Although the passwords were encrypted, attackers have all the time in the world to crack them offline at their leisure.”

Dewhurst further noted potential risks:

“If the passwords used were weak in the first place, it’s almost certain that the threat actor has the plaintext versions already.”

The exposure of configuration data can facilitate further, more targeted cyber-attacks on affected organizations, particularly if threat actors manage to decrypt the stolen credentials.

What Steps Is SonicWall Taking Following the Breach?

SonicWall stated it has notified all affected customers and provided tools to help them detect and remediate potential threats. The company also encouraged customers to access the MySonicWall.com portal and review their exposure status. Additional security hardening and heightened monitoring of cloud infrastructure were instituted as preventive measures. Collaborating with Mandiant, SonicWall continues to investigate the breach and refine its security processes in response to new attack vectors and criticisms regarding earlier oversight in its public API protections.

Cyberattacks targeting SonicWall are not new, with several product vulnerabilities exploited in past ransomware campaigns and listed in the CISA KEV catalog. Yet, this event distinguishes itself by directly penetrating SonicWall’s infrastructure instead of leveraging external device vulnerabilities, amplifying worries in the cybersecurity community. Industry observers note an ongoing need for vendors to openly communicate breach impacts and to consistently enforce robust security mechanisms, especially for customer-facing systems that host configuration or credential backups.

Organizations that rely on cloud-based security products should regularly review account privileges, enforce strong password policies, and consider the strategic value of off-cloud redundant backups for sensitive configurations. While SonicWall has taken steps to mitigate immediate risks and improve defenses, the incident underscores persistent challenges in securing complex, cloud-based environments. For IT teams, the SonicWall breach is a reminder to diligently monitor vendor advisories, act swiftly on exposure notifications, and continuously audit the security posture of both in-house and third-party solutions. Regularly updating credentials and staying alert to industry threat intelligence can help reduce exposure from similar incidents.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Clop Targets Oracle E-Business Suite in Coordinated Ransomware Attacks

Court Faces Urgent Demand to Halt Data Merger Targeting Voters

Microsoft Links GoAnywhere Flaw to Storm-1175 Ransomware Attacks

OpenAI Identifies Existing Hacking Tactics Adopting ChatGPT for Efficiency

Clop Hackers Target Oracle Zero-Day, Prompt Urgent Response

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Chevy Launches Bolt EV, Targets Tesla’s Affordable Model Segment
Next Article Tesla Boosts Cybercab Progress by Starting Test Track Trials

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Players Crack October 10 Wordle Challenge with Strategic Clues
Gaming
Intel Brings MFG to Its GPUs, Leaving AMD as the Holdout
Computing
Delta Airlines Sees Premium Travel Drive Strong Quarterly Growth
Technology
Tesla Boosts Cybercab Progress by Starting Test Track Trials
Electric Vehicle
Chevy Launches Bolt EV, Targets Tesla’s Affordable Model Segment
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?