Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

All SonicWall Cloud Backup Users Had Firewall Configurations Stolen

0
Medium
Vulnerability
Published: Thu Oct 09 2025 (10/09/2025, 08:30:38 UTC)
Source: SecurityWeek

Description

In early September, hackers stole the firewall configuration backup files stored using the MySonicWall service. The post All SonicWall Cloud Backup Users Had Firewall Configurations Stolen appeared first on SecurityWeek .

AI-Powered Analysis

AILast updated: 10/09/2025, 08:38:06 UTC

Technical Analysis

In September 2025, a significant data breach occurred involving SonicWall's MySonicWall cloud backup service, where threat actors accessed and exfiltrated firewall configuration backup files for all customers who used this service. These files include encrypted credentials and detailed firewall configuration data. While the encryption remains intact, possession of these files could enable attackers to conduct targeted attacks, such as credential cracking, configuration manipulation, or lateral movement within affected networks. Initially, SonicWall reported that less than 5% of customers were impacted, but a subsequent update revealed that all firewalls configured to back up to the cloud were compromised. SonicWall has categorized affected devices into three risk levels: 'Active – High Priority' for internet-exposed devices, 'Active – Lower Priority' for non-exposed devices, and 'Inactive' for devices not communicating for 90 days. The company is notifying affected customers and partners, urging them to verify device status via the MySonicWall portal, reset passwords, and follow detailed containment and remediation procedures. SonicWall is also working with cybersecurity firm Mandiant to strengthen cloud infrastructure security and monitoring. Although no known exploits are currently active in the wild, the breach poses a medium severity risk due to the sensitive nature of firewall configurations and credentials, which could be leveraged for sophisticated attacks. This incident underscores the importance of securing cloud backup services and the potential risks of centralized storage of critical security configurations.

Potential Impact

For European organizations, this breach poses a significant risk, especially for those relying on SonicWall firewalls with cloud backup enabled. Compromise of firewall configurations can lead to unauthorized access, network infiltration, and potential disruption of critical services. Attackers with access to these configurations could bypass firewall rules, disable security controls, or pivot to other internal systems, threatening confidentiality, integrity, and availability. Organizations with internet-exposed devices are at higher risk of immediate exploitation. The breach could also lead to compliance issues under GDPR due to potential unauthorized access to personal data protected by these firewalls. Additionally, the incident may erode trust in cloud backup solutions and prompt regulatory scrutiny. European sectors with critical infrastructure, finance, healthcare, and government entities using SonicWall products may face increased threat levels, potentially impacting national security and economic stability.

Mitigation Recommendations

European organizations should immediately log into their MySonicWall accounts to identify if their firewalls have cloud backups stored and check device risk status. They must reset all passwords associated with SonicWall accounts and any credentials stored in the backup files. Organizations should disable cloud backup temporarily until remediation is complete and consider restoring firewall configurations from offline or alternative secure backups. Implement multi-factor authentication (MFA) on all SonicWall and related accounts to reduce unauthorized access risk. Conduct thorough network monitoring for unusual activity, especially lateral movement or changes in firewall behavior. Apply SonicWall’s recommended containment and remediation steps, including firmware updates and security hardening measures released post-incident. Engage with cybersecurity partners like Mandiant for incident response support and forensic analysis. Review and enhance cloud backup security policies, including encryption key management and access controls. Finally, conduct staff training on recognizing phishing or social engineering attempts that may leverage stolen configuration data.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.securityweek.com/all-sonicwall-cloud-backup-users-had-firewall-configurations-stolen/","fetched":true,"fetchedAt":"2025-10-09T08:37:49.955Z","wordCount":975}

Threat ID: 68e7745d6b49b1a4209508f3

Added to database: 10/9/2025, 8:37:49 AM

Last enriched: 10/9/2025, 8:38:06 AM

Last updated: 10/9/2025, 1:17:48 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats