SonicWall

SonicWall

SonicWall suffered a cyberattack where threat actors brute-forced their **MySonicWall** cloud backup service, exposing firewall configuration files of **all customers** using the feature. The leaked files included sensitive data such as **network rules, VPN configurations, admin credentials (LDAP, RADIUS, SNMP), and stored passwords**, increasing the risk of **targeted network intrusions**. Initially downplaying the impact (claiming <5% of customers were affected), SonicWall later acknowledged the breach was far broader, potentially compromising **hundreds of thousands of global customers**. While encryption remained intact, attackers could decrypt or exploit the exposed configurations to **bypass defenses, launch insider-like attacks, or steal service credentials**. SonicWall urged customers to **delete cloud backups, rotate secrets, and recreate configurations locally** to mitigate risks. The breach did not affect other MySonicWall services or devices but posed severe operational and security threats to affected organizations.

Source: https://www.techradar.com/pro/security/sonicwall-confirms-every-cloud-backup-customer-was-hit-by-data-breach

TPRM report: https://www.rankiteo.com/company/sonicwall

"id": "son2892228101025",
"linkid": "sonicwall",
"type": "Breach",
"date": "10/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'All customers using MySonicWall '
                                              'cloud backup feature (initially '
                                              'claimed <5%, later revealed to '
                                              'be all users of the feature)',
                        'industry': 'Network Security',
                        'location': 'Global',
                        'name': 'SonicWall',
                        'size': '~500,000 customers (not all using '
                                'firewall/cloud backup services)',
                        'type': 'Cybersecurity Company'}],
 'attack_vector': ['Brute Force Attack'],
 'customer_advisories': ['Delete existing cloud backups, change credentials, '
                         'rotate shared secrets, and recreate configurations '
                         'locally.'],
 'data_breach': {'data_encryption': ['Files were encrypted but possession '
                                     'increases risk of '
                                     'decryption/brute-forcing'],
                 'data_exfiltration': True,
                 'file_types_exposed': ['Firewall Configuration Files'],
                 'personally_identifiable_information': ['Potentially (if '
                                                         'admin credentials '
                                                         'included PII)'],
                 'sensitivity_of_data': ['High (Includes credentials and '
                                         'network topology details)'],
                 'type_of_data_compromised': ['Firewall Configuration Files',
                                              'Network Rules',
                                              'Access Policies',
                                              'VPN Configurations',
                                              'Service Credentials (LDAP, '
                                              'RADIUS, SNMP)',
                                              'Admin Usernames and Passwords '
                                              '(if stored in config)']},
 'date_detected': '2025-09-15',
 'date_publicly_disclosed': '2025-09-15',
 'description': 'Attackers brute-forced SonicWall’s MySonicWall cloud service, '
                'exposing firewall configuration files of global customers. '
                'The files included network rules, access policies, VPN '
                'configurations, and service credentials (LDAP, RADIUS, SNMP), '
                'as well as admin usernames and passwords if stored in the '
                'config. SonicWall initially underestimated the scale, later '
                'revealing that all customers using the MySonicWall cloud '
                'backup feature were affected. The company urged users to '
                'delete backups, rotate secrets, and recreate configurations '
                'locally to mitigate risks of credential leaks and targeted '
                'network intrusions.',
 'impact': {'brand_reputation_impact': ['Potential Loss of Trust Due to '
                                        'Underestimation of Incident Scale and '
                                        'Exposure of Sensitive Configuration '
                                        'Data'],
            'data_compromised': ['Firewall Configuration Files (Network Rules, '
                                 'Access Policies, VPN Configurations)',
                                 'Service Credentials (LDAP, RADIUS, SNMP)',
                                 'Admin Usernames and Passwords (if stored in '
                                 'config)'],
            'identity_theft_risk': ['High (Due to Potential Exposure of Admin '
                                    'Credentials and Service Secrets)'],
            'operational_impact': ['Increased Risk of Targeted Attacks Due to '
                                   'Exposed Configuration Details',
                                   'Need for Customers to Delete Backups, '
                                   'Rotate Secrets, and Recreate '
                                   'Configurations Locally'],
            'systems_affected': ['MySonicWall Cloud Backup Service']},
 'initial_access_broker': {'entry_point': ['MySonicWall Cloud Service (via '
                                           'brute-force attack)'],
                           'high_value_targets': ['Firewall configuration '
                                                  'files containing network '
                                                  'topology, credentials, and '
                                                  'access policies']},
 'investigation_status': 'Ongoing (Customers urged to take remediation '
                         'actions)',
 'lessons_learned': ['Underestimation of incident scale can erode trust; '
                     'transparency is critical. Weak authentication mechanisms '
                     'in cloud services pose significant risks. Firewall '
                     'configuration files are high-value targets for threat '
                     'actors seeking insider knowledge for targeted attacks.'],
 'motivation': ['Credential Theft',
                'Targeted Network Intrusions',
                'Insider Knowledge for Future Attacks'],
 'post_incident_analysis': {'corrective_actions': ['Enhanced authentication '
                                                   'for cloud services.',
                                                   'Improved incident '
                                                   'communication protocols.',
                                                   'Development of tools for '
                                                   'customer remediation.'],
                            'root_causes': ['Weak authentication mechanisms in '
                                            'MySonicWall cloud service, '
                                            'enabling brute-force attacks.',
                                            "Underestimation of the incident's "
                                            'scope during initial '
                                            'disclosure.']},
 'recommendations': ['Implement multi-factor authentication (MFA) for cloud '
                     'services, especially those storing sensitive '
                     'configurations.',
                     'Regularly audit and rotate credentials and secrets '
                     'stored in firewall configurations.',
                     'Avoid storing plaintext or weakly encrypted credentials '
                     'in configuration backups.',
                     'Monitor for unusual access patterns or brute-force '
                     'attempts on cloud services.',
                     'Conduct third-party security assessments for cloud '
                     'backup solutions.',
                     'Educate customers on secure backup practices, including '
                     'local storage of sensitive configurations.'],
 'references': [{'source': 'The Register'},
                {'source': 'TechRadar Pro',
                 'url': 'https://www.techradar.com'}],
 'response': {'communication_strategy': ['Public notification via advisory',
                                         'Direct notification to impacted '
                                         'partners and customers'],
              'containment_measures': ['Urged customers to delete existing '
                                       'cloud backups',
                                       'Encouraged credential rotation and '
                                       'secret rotation',
                                       'Recommended recreating backups '
                                       'locally'],
              'incident_response_plan_activated': True,
              'remediation_measures': ['Released tools to assist with device '
                                       'assessment and remediation']},
 'stakeholder_advisories': ['SonicWall notified all impacted partners and '
                            'customers with remediation guidance.'],
 'threat_actor': ['Unnamed Threat Actors'],
 'title': 'SonicWall Cloud Backup Breach Exposes Firewall Configuration Files',
 'type': ['Data Breach', 'Unauthorized Access', 'Credential Theft'],
 'vulnerability_exploited': ['Weak Authentication Mechanisms in MySonicWall '
                             'Cloud Service']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.