SonicWall says state-sponsored hackers behind security breach in September
嗯,用户让我总结一篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是 SonicWall 在9月份的安全事件调查结果。他们发现是国家支持的黑客入侵了他们的云备份环境,通过API访问了客户的防火墙配置备份文件。这些文件包含敏感信息,可能导致客户防火墙被攻击。SonicWall已经通知客户重置密码,并且确认这次事件没有影响到他们的产品、系统或客户网络。此外,这次攻击与Akira勒索软件无关。 接下来,我需要将这些要点浓缩到100字以内。确保涵盖事件原因、影响范围、客户的应对措施以及与其他攻击的无关性。 可能会这样组织语言:SonicWall调查发现9月安全事件由国家支持的黑客通过API入侵云备份环境导致,泄露客户防火墙配置文件。未影响产品和系统,建议客户重置密码,并排除与Akira勒索软件关联。 检查字数是否在限制内,并确保信息准确无误。 </think> SonicWall调查发现9月安全事件由国家支持的黑客通过API入侵云备份环境导致,泄露客户防火墙配置文件。未影响产品和系统,建议客户重置密码,并排除与Akira勒索软件关联。 2025-11-5 17:15:20 Author: www.bleepingcomputer.com(查看原文) 阅读量:21 收藏

SonicWall says state-sponsored hackers behind September security breach

SonicWall's investigation into the September security breach that exposed customers' firewall configuration backup files concludes that state-sponsored hackers were behind the attack.

The network security company says that incident responders from Mandiant confirmed that the malicious activity had no impact on SonicWall's products, firmware, systems, tools, source code, or customer networks.

“The Mandiant investigation is now complete. Their findings confirm that the malicious activity – carried out by a state-sponsored threat actor - was isolated to the unauthorized access of cloud backup files from a specific cloud environment using an API call,” SonicWall states.

Wiz

“The incident did not impact SonicWall products or firmware. No other SonicWall systems or tools, source code, or customer networks were disrupted or compromised,” the vendor says.

On September 17, the American company disclosed "an incident that exposed firewall configuration backup files stored in certain MySonicWall accounts."

An attacker could extract from these files sensitive information, like access credentials and tokens, that could make it "significantly easier" for them to exploit a customer's firewalls.

The company immediately advised customers to reset their MySonicWall account credentials, temporary access codes, passwords for LDAP, RADIUS, or TACACS+ servers, passwords for L2TP/PPPoE/PPTP WAN interfaces, and shared secrets in IPSec site-to-site and GroupVPN policies.

In an update on October 9, SonicWall stated that the security breach affected all customers who used the company’s cloud backup service to store firewall configuration files.

The investigation is now complete,, and the network security vendor states that the breach was contained to a specific part of its environment and did not impact the safety of its products.

Furthermore, the company assured that the investigated nation-state activity has no connection with attacks from the Akira ransomware gang that targeted MFA-protected SonicWall VPN accounts in late September.

More recently, on October 13, Huntress reported seeing elevated malicious activity targeting SonicWall SSLVPN accounts and successfully compromising over a hundred of them using valid credentials.

Huntress did not find any evidence connecting these attacks to the September firewall configuration files exposure, and SonicWall did not respond to our requests regarding the matter.

Wiz

7 Security Best Practices for MCP

As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

This free cheat sheet outlines 7 best practices you can start using today.


文章来源: https://www.bleepingcomputer.com/news/security/sonicwall-says-state-sponsored-hackers-behind-security-breach-in-september/
如有侵权请联系:admin#unsafe.sh