TLDR
Huntress found over 100 compromised SonicWall SSL VPN accounts across 16 customers.
Reset passwords, enable MFA, and audit remote access now.
What happened
On October 4, 2025, threat actors began targeting SonicWall SSL VPN devices. They used valid credentials to log in. The attackers did not rely on brute‑force attacks. Instead, they leveraged stolen or reused passwords. By October 11, Huntress reported more than 100 compromised accounts.
The compromise spanned 16 distinct customer environments. Each environment hosted multiple VPN endpoints. Attackers quickly authenticated and entered the management interface. Some sessions were short. Others lasted long enough to conduct internal reconnaissance.
During the reconnaissance phase, attackers performed network scans. They probed for open ports and vulnerable services. In several cases, they attempted to access local Windows accounts. The goal was to move laterally inside the network. In other instances, the actors disconnected without further activity.
This incident follows a prior breach disclosed by SonicWall. That earlier breach involved unauthorized exposure of firewall configuration backup files. Those backup files contain sensitive network topology and credential data. The exposure gave attackers a richer data set to craft future attacks.
Huntress emphasized that the current campaign is ransomware‑focused. The attackers appear to be searching for high‑value data. They are also testing the resilience of victim environments. The rapid authentication suggests that credential theft, not vulnerability exploitation, is the primary vector.
Why it matters
SSL VPN devices are a common remote‑access point. They sit at the edge of the network. When compromised, they provide a direct tunnel into internal resources. This makes them a high‑value target for ransomware groups.
Using valid credentials reduces detection chances. Traditional intrusion‑detection systems look for brute‑force patterns. Credential‑based logins blend in with normal traffic. This increases dwell time for attackers.
The breach also highlights the risk of cloud backup services. SonicWall’s cloud backup stores configuration files. If those files are exposed, attackers can map the network. They can also retrieve pre‑shared keys and admin passwords.
Organizations that rely on default or weak passwords are especially vulnerable. Password reuse across services amplifies the risk. A single leaked password can compromise multiple systems.
Ransomware operators profit from rapid encryption. Gaining VPN access accelerates that timeline. They can encrypt file servers, databases, and backup repositories before detection.
Finally, the incident underscores the importance of defense‑in‑depth. Relying solely on perimeter security is insufficient. Multi‑factor authentication, least‑privilege access, and continuous monitoring are essential controls.
Who is affected
- Enterprises that deploy SonicWall SSL VPN appliances.
- Managed service providers that host SonicWall devices for clients.
- Organizations that use SonicWall’s cloud backup for firewall configurations.
- Any user who authenticates to the VPN with reused or weak credentials.
- Internal teams that depend on VPN‑based remote access for daily operations.
Even small and medium‑size businesses are at risk. The breach does not discriminate by industry. Financial services, healthcare, manufacturing, and education sectors have reported exposure.
Customers who have not applied recent firmware updates are more exposed. Older firmware may lack mitigations for known vulnerabilities.
How to check exposure
Start with a log review. Pull authentication logs from the SonicWall management console. Look for logins from unusual IP addresses or geographic locations. Flag any successful login that occurred outside normal business hours.
Cross‑reference VPN login timestamps with user activity. If a user did not initiate a remote session, investigate the source.
Examine cloud backup logs. Verify who accessed backup files and when. Unexpected download events may indicate credential misuse.
Run a network scan from inside the VPN segment. Identify any new hosts or services that were not previously documented.
Check for lateral movement attempts. Review Windows event logs for failed logon attempts on local accounts. Look for new admin accounts that were created without proper change‑control.
Use a credential‑theft detection tool. Many solutions can alert on password spraying or reuse across services.
Document findings in a centralized incident‑response ticket. Include timestamps, affected usernames, and IP addresses.
Fast mitigation
- Reset all VPN credentials immediately. Force a password change for every user with VPN access.
- Enable multi‑factor authentication (MFA). Require a second factor for every remote login.
- Restrict remote access. Limit VPN connections to known IP ranges where possible.
- Update firmware. Apply the latest SonicWall patches to address known bugs.
- Review and tighten firewall rules. Remove any unnecessary inbound ports.
- Audit cloud backup permissions. Ensure only authorized accounts can download configuration files.
- Monitor for anomalous activity. Deploy a SIEM rule that flags logins from new locations.
- Educate users. Remind staff to avoid password reuse and to report suspicious login prompts.
- Conduct a post‑incident review. Identify gaps in your remote‑access policy and remediate them.
These steps should be executed within 24 hours of detection. Speed reduces the window for ransomware encryption. After mitigation, schedule a full security audit of your VPN architecture.
Remember that security is an ongoing process. Regularly rotate passwords, enforce MFA, and keep software up to date. By treating VPN access as a critical asset, you can prevent future credential‑based breaches.