All SonicWall Cloud Backup Users Had Firewall Configurations Stolen
In early September, hackers stole the firewall configuration backup files stored using the MySonicWall service. The post All SonicWall Cloud Backup Users Had Firewall Configurations Stolen appeared first on SecurityWeek .
AI Analysis
Technical Summary
In September 2025, a significant data breach occurred involving SonicWall's MySonicWall cloud backup service, where threat actors accessed and exfiltrated firewall configuration backup files for all customers who used this service. These files include encrypted credentials and detailed firewall configuration data. While the encryption remains intact, possession of these files could enable attackers to conduct targeted attacks, such as credential cracking, configuration manipulation, or lateral movement within affected networks. Initially, SonicWall reported that less than 5% of customers were impacted, but a subsequent update revealed that all firewalls configured to back up to the cloud were compromised. SonicWall has categorized affected devices into three risk levels: 'Active – High Priority' for internet-exposed devices, 'Active – Lower Priority' for non-exposed devices, and 'Inactive' for devices not communicating for 90 days. The company is notifying affected customers and partners, urging them to verify device status via the MySonicWall portal, reset passwords, and follow detailed containment and remediation procedures. SonicWall is also working with cybersecurity firm Mandiant to strengthen cloud infrastructure security and monitoring. Although no known exploits are currently active in the wild, the breach poses a medium severity risk due to the sensitive nature of firewall configurations and credentials, which could be leveraged for sophisticated attacks. This incident underscores the importance of securing cloud backup services and the potential risks of centralized storage of critical security configurations.
Potential Impact
For European organizations, this breach poses a significant risk, especially for those relying on SonicWall firewalls with cloud backup enabled. Compromise of firewall configurations can lead to unauthorized access, network infiltration, and potential disruption of critical services. Attackers with access to these configurations could bypass firewall rules, disable security controls, or pivot to other internal systems, threatening confidentiality, integrity, and availability. Organizations with internet-exposed devices are at higher risk of immediate exploitation. The breach could also lead to compliance issues under GDPR due to potential unauthorized access to personal data protected by these firewalls. Additionally, the incident may erode trust in cloud backup solutions and prompt regulatory scrutiny. European sectors with critical infrastructure, finance, healthcare, and government entities using SonicWall products may face increased threat levels, potentially impacting national security and economic stability.
Mitigation Recommendations
European organizations should immediately log into their MySonicWall accounts to identify if their firewalls have cloud backups stored and check device risk status. They must reset all passwords associated with SonicWall accounts and any credentials stored in the backup files. Organizations should disable cloud backup temporarily until remediation is complete and consider restoring firewall configurations from offline or alternative secure backups. Implement multi-factor authentication (MFA) on all SonicWall and related accounts to reduce unauthorized access risk. Conduct thorough network monitoring for unusual activity, especially lateral movement or changes in firewall behavior. Apply SonicWall’s recommended containment and remediation steps, including firmware updates and security hardening measures released post-incident. Engage with cybersecurity partners like Mandiant for incident response support and forensic analysis. Review and enhance cloud backup security policies, including encryption key management and access controls. Finally, conduct staff training on recognizing phishing or social engineering attempts that may leverage stolen configuration data.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Switzerland
All SonicWall Cloud Backup Users Had Firewall Configurations Stolen
Description
In early September, hackers stole the firewall configuration backup files stored using the MySonicWall service. The post All SonicWall Cloud Backup Users Had Firewall Configurations Stolen appeared first on SecurityWeek .
AI-Powered Analysis
Technical Analysis
In September 2025, a significant data breach occurred involving SonicWall's MySonicWall cloud backup service, where threat actors accessed and exfiltrated firewall configuration backup files for all customers who used this service. These files include encrypted credentials and detailed firewall configuration data. While the encryption remains intact, possession of these files could enable attackers to conduct targeted attacks, such as credential cracking, configuration manipulation, or lateral movement within affected networks. Initially, SonicWall reported that less than 5% of customers were impacted, but a subsequent update revealed that all firewalls configured to back up to the cloud were compromised. SonicWall has categorized affected devices into three risk levels: 'Active – High Priority' for internet-exposed devices, 'Active – Lower Priority' for non-exposed devices, and 'Inactive' for devices not communicating for 90 days. The company is notifying affected customers and partners, urging them to verify device status via the MySonicWall portal, reset passwords, and follow detailed containment and remediation procedures. SonicWall is also working with cybersecurity firm Mandiant to strengthen cloud infrastructure security and monitoring. Although no known exploits are currently active in the wild, the breach poses a medium severity risk due to the sensitive nature of firewall configurations and credentials, which could be leveraged for sophisticated attacks. This incident underscores the importance of securing cloud backup services and the potential risks of centralized storage of critical security configurations.
Potential Impact
For European organizations, this breach poses a significant risk, especially for those relying on SonicWall firewalls with cloud backup enabled. Compromise of firewall configurations can lead to unauthorized access, network infiltration, and potential disruption of critical services. Attackers with access to these configurations could bypass firewall rules, disable security controls, or pivot to other internal systems, threatening confidentiality, integrity, and availability. Organizations with internet-exposed devices are at higher risk of immediate exploitation. The breach could also lead to compliance issues under GDPR due to potential unauthorized access to personal data protected by these firewalls. Additionally, the incident may erode trust in cloud backup solutions and prompt regulatory scrutiny. European sectors with critical infrastructure, finance, healthcare, and government entities using SonicWall products may face increased threat levels, potentially impacting national security and economic stability.
Mitigation Recommendations
European organizations should immediately log into their MySonicWall accounts to identify if their firewalls have cloud backups stored and check device risk status. They must reset all passwords associated with SonicWall accounts and any credentials stored in the backup files. Organizations should disable cloud backup temporarily until remediation is complete and consider restoring firewall configurations from offline or alternative secure backups. Implement multi-factor authentication (MFA) on all SonicWall and related accounts to reduce unauthorized access risk. Conduct thorough network monitoring for unusual activity, especially lateral movement or changes in firewall behavior. Apply SonicWall’s recommended containment and remediation steps, including firmware updates and security hardening measures released post-incident. Engage with cybersecurity partners like Mandiant for incident response support and forensic analysis. Review and enhance cloud backup security policies, including encryption key management and access controls. Finally, conduct staff training on recognizing phishing or social engineering attempts that may leverage stolen configuration data.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://www.securityweek.com/all-sonicwall-cloud-backup-users-had-firewall-configurations-stolen/","fetched":true,"fetchedAt":"2025-10-09T08:37:49.955Z","wordCount":975}
Threat ID: 68e7745d6b49b1a4209508f3
Added to database: 10/9/2025, 8:37:49 AM
Last enriched: 10/9/2025, 8:38:06 AM
Last updated: 10/9/2025, 1:17:48 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9371: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MuffinGroup Betheme
MediumCVE-2025-10249: CWE-23 Relative Path Traversal in Revolution Slider Slider Revolution
MediumCVE-2023-5056: Missing Authorization in Red Hat Service Interconnect 1 for RHEL 9
MediumChinese Hackers Breached Law Firm Williams & Connolly via Zero-Day
MediumDiscord Says 70,000 Users Had IDs Exposed in Recent Data Breach
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.