Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: UNC6148 Targets Patched SonicWall SMA 100 Devices in Ongoing Attacks
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

UNC6148 Targets Patched SonicWall SMA 100 Devices in Ongoing Attacks

Highlights

  • UNC6148 targets SonicWall SMA 100 appliances using stolen admin credentials.

  • Fully patched devices remain at risk despite discontinued support and updates.

  • Migration to newer network security platforms is strongly emphasized for organizations.

Kaan Demirel
Last updated: 16 July, 2025 - 9:30 pm 9:30 pm
Kaan Demirel 3 hours ago
Share
SHARE

Corporate networks across various sectors are facing targeted attacks leveraging SonicWall Secure Mobile Access (SMA) 100 series appliances, despite vendors no longer supporting these devices. Sophisticated threat actors continue to exploit existing vulnerabilities, heightening risks for organizations that rely on legacy remote access hardware. Efforts to migrate to alternative solutions have grown, but many companies remain dependent on legacy systems due to operational or financial constraints, thus maintaining exposure to active threat campaigns. Reports point to new attack patterns compared to earlier cyber incidents, illustrating a persistent security challenge for aging technology ecosystems.

Contents
What Attack Methods Are Threat Groups Using?How Are Vulnerabilities and Device Lifecycles Impacting Security?What Is the Scope and Technical Detail of These Attacks?

In previous incidents involving SonicWall devices, attackers often focused on unpatched appliances or active zero-day vulnerabilities, leading to widespread concern within IT security communities. This recent campaign distinguishes itself by targeting fully updated systems and using previously stolen administrative credentials, moving away from solely exploiting unaddressed vulnerabilities. Earlier attacks prompted users to apply security updates and migrate to newer appliances, but current findings reveal that those steps alone might not guarantee safety as threat actors adopt new tactics. This ongoing situation highlights a growing complexity in defending endpoints against advanced persistent threats leveraging legacy hardware for initial access.

What Attack Methods Are Threat Groups Using?

The financially motivated group identified as UNC6148 accesses SonicWall SMA 100 series appliances by leveraging previously obtained administrator credentials. Google’s Threat Intelligence Group reported that these credentials may have been acquired prior to security updates, enabling unauthorized access even after the devices are patched. The attackers reportedly establish VPN sessions and sometimes deploy the OVERSTEP backdoor, facilitating further network intrusion and data theft, according to researchers involved in the investigation.

How Are Vulnerabilities and Device Lifecycles Impacting Security?

SonicWall devices, particularly the SMA 100 series, have repeatedly appeared in the Cybersecurity and Infrastructure Security Agency’s catalog of known exploited vulnerabilities. Research data indicates that half of SonicWall’s recent exploited vulnerabilities are associated with this appliance line. In response, SonicWall is accelerating the end-of-support timeline for the SMA 100 and guiding customers toward more secure alternatives, such as Cloud Secure Edge and the SMA 1000 series. However, SonicWall has committed to continuing firmware support for remaining users, noting that updates may become more frequent as part of risk mitigation efforts.

“We understand that not all customers have transitioned yet, and we remain committed to supporting existing SMA 100 deployments with firmware updates throughout the remaining lifecycle,”

stated Bret Fitzgerald, senior director of global communications at SonicWall.

What Is the Scope and Technical Detail of These Attacks?

Available forensic data remains limited due to the selective removal of log entries by the adversaries. Investigators suggest that vulnerabilities such as CVE-2021-20038, CVE-2024-38475, and others could have been used by UNC6148 to initially gain access, with malware deployment and ransomware operations likely as end goals. The group’s activity has overlapped with additional reports of SonicWall exploitation, including incidents involving Abyss-branded ransomware. Notably, post-compromise actions include reconnaissance, file manipulation, and the installation of malware for persistent access, as detailed in the Google Threat Intelligence Group’s findings. The actual number of compromised devices and affected organizations has not been disclosed by either Google or SonicWall.

Objective risk assessment continues to be essential for organizations facing threats from persistent adversaries targeting outdated network appliances. Even as software and firmware patching reduce the risk of exploitation, attackers’ use of previously stolen credentials illustrates the importance of broader mitigation strategies, such as migrating to modern, actively supported platforms and implementing robust credential management practices. For businesses utilizing legacy SonicWall hardware, reviewing current asset inventories and accelerating migration timelines can reduce long-term exposure. The challenges surrounding legacy network security devices reaffirm the need for proactive lifecycle planning and continuous monitoring in the ongoing fight against sophisticated cyber threats.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Senators Question DHS Over Database Use in Voter Citizenship Checks

Army Veteran Admits to Telecom Hack and Extortion Plot

Senators Question Waltz’s Signal Use in Military Communications

Experts Flag Major Security Flaws in Grok 4 as xAI Expands Federal Access

Virtru Raises $50 Million, Secures Data as AI Use Grows

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Tesla Implements Voice Activation for Grok AI in Vehicles
Next Article Intuitive Surgical Demonstrates Remote Surgery With da Vinci 5 Robot

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Nvidia Demonstrates AI Texture Compression to Optimize GPU Memory Use
Computing
Intuitive Surgical Demonstrates Remote Surgery With da Vinci 5 Robot
Robotics
Tesla Implements Voice Activation for Grok AI in Vehicles
Electric Vehicle
AI Agents Accelerate Executive Decisions as Companies Bet on Automation
AI Technology
Tesla Launches 24/7 Supercharger Diner in Los Angeles
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?