Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Xiaomi’s Leica Edition flagship confirmed for new global release

    Apple iPad Pro unlikely to get major update for years despite stronger-than-ever competition

    This sleek all-black Citizen Eco-Drive dress watch is 54% off right now

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025
    • Crypto

      Wall Street Moves Into Prediction Markets With Election-Contract ETF Filings

      February 18, 2026

      Tectonic to Host Inaugural Quantum Summit at ETHDenver 2026 Focused on Post-Quantum Cryptography Readiness for Web3

      February 18, 2026

      Ki Young Ju Says Bitcoin May Need to Hit $55K Before True Recovery Begins

      February 18, 2026

      MYX Finance Is Oversold For The First Time Ever, Yet No Relief In Sight

      February 18, 2026

      Everyone is Talking about the SaaSpocalypse, But Why Does it matter for Crypto?

      February 18, 2026
    • Technology

      Xiaomi’s Leica Edition flagship confirmed for new global release

      February 18, 2026

      Apple iPad Pro unlikely to get major update for years despite stronger-than-ever competition

      February 18, 2026

      This sleek all-black Citizen Eco-Drive dress watch is 54% off right now

      February 18, 2026

      Google’s new smartphone confirmed to launch globally with old Tensor G4 silicon on eve of release

      February 18, 2026

      Nintendo’s VR accessory for the Switch 2 is finally available

      February 18, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»SonicWall VPN accounts breached using stolen creds in widespread attacks
    Technology

    SonicWall VPN accounts breached using stolen creds in widespread attacks

    TechAiVerseBy TechAiVerseOctober 13, 2025No Comments3 Mins Read3 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    SonicWall VPN accounts breached using stolen creds in widespread attacks
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    SonicWall VPN accounts breached using stolen creds in widespread attacks

    Researchers warn that threat actors have compromised more than a hundred SonicWall SSLVPN accounts in a large-scale campaign using stolen, valid credentials.

    Although in some cases the attackers disconnected after a short period, in others they followed up with network scans and attempts to access local Windows accounts.

    Most of this activity began on October 4, as observed by managed cybersecurity platform Huntress at multiple customer environments.

    “Threat actors are authenticating into multiple accounts rapidly across compromised devices,” the researchers said, adding that “the speed and scale of these attacks imply that the attackers appear to control valid credentials rather than brute-forcing.”

    The attacks have impacted over 100 SonicWall SSLVPN accounts across 16 environments that Huntress protects, indicating a significant and widespread campaign that was still ongoing on October 10.

    In most cases, the malicious requests originated from the IP address 202.155.8[.]73, the researchers said.

    After the authentication step, Huntress observed activity specific to the reconnaissance and lateral movement steps of an attack as the threat actor tried to access a large number of local Windows accounts.

    Huntress underlines that they did not find evidence connecting the spate of compromises they observed to the recent SonicWall breach that exposed the firewall configuration files for all cloud backup customers.

    Because they contain highly sensitive data, these files are encoded, and the credentials and secrets within are individually encrypted using the AES-256 algorithm.

    While an attacker could decode the files, they would see the authentication passwords and keys in encrypted form, the network security company explained.

    BleepingComputer has contacted SonicWall for a comment on the activity that Huntress researchers observed, but a statement wasn’t immediately available.

    According to SonicWall’s security checklist, system administrators need to take the following protective steps:

    • Reset and update all local user passwords and temporary access codes
    • Update passwords on LDAP, RADIUS, or TACACS+ servers
    • Update secrets in all IPSec site-to-site and GroupVPN policies
    • Update L2TP/PPPoE/PPTP WAN interface passwords
    • Reset the L2TP/PPPoE/PPTP WAN interfaces

    Huntress proposes the additional measures of immediately restricting WAN management and remote access when it’s not needed, and disabling or limiting HTTP, HTTPS, SSH, and SSL VPN until all secrets are rotated.

    External API keys, dynamic DNS, and SMTP/FTP credentials should also be revoked, and automation secrets pertinent to firewall and management systems should be invalidated.

    All admin and remote accounts should be protected by multi-factor authentication. The service re-introduction must be performed in a staged manner to observe for suspicious activity at each step.

    The Security Validation Event of the Year: The Picus BAS Summit

    Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation.

    Don’t miss the event that will shape the future of your security strategy

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleMicrosoft investigates outage affecting Microsoft 365 apps
    Next Article Massive multi-country botnet targets RDP services in the US
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Xiaomi’s Leica Edition flagship confirmed for new global release

    February 18, 2026

    Apple iPad Pro unlikely to get major update for years despite stronger-than-ever competition

    February 18, 2026

    This sleek all-black Citizen Eco-Drive dress watch is 54% off right now

    February 18, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025683 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025272 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025155 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025114 Views
    Don't Miss
    Technology February 18, 2026

    Xiaomi’s Leica Edition flagship confirmed for new global release

    Xiaomi’s Leica Edition flagship confirmed for new global release – NotebookCheck.net News ⓘ XiaomiThe Leica…

    Apple iPad Pro unlikely to get major update for years despite stronger-than-ever competition

    This sleek all-black Citizen Eco-Drive dress watch is 54% off right now

    Google’s new smartphone confirmed to launch globally with old Tensor G4 silicon on eve of release

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Xiaomi’s Leica Edition flagship confirmed for new global release

    February 18, 20263 Views

    Apple iPad Pro unlikely to get major update for years despite stronger-than-ever competition

    February 18, 20264 Views

    This sleek all-black Citizen Eco-Drive dress watch is 54% off right now

    February 18, 20263 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.