Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

SonicWall Zero-Day RCE Exploited

July 17, 2025
Reading Time: 3 mins read
in Alerts
SonicWall Zero-Day RCE Exploited

Google’s Threat Intelligence Group (GTIG) has identified a sophisticated and ongoing cyberattack campaign, attributed to the financially motivated group UNC6148, targeting end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances. Operating since at least October 2024, UNC6148 is exploiting previously stolen credentials and potentially an unknown zero-day remote code execution vulnerability. This allows them to maintain persistent access to compromised systems, even those that have been fully patched. The campaign signifies a worrying escalation in attacks against network infrastructure, as the threat actors can successfully compromise appliances despite organizations applying the latest security updates. GTIG assesses with high confidence that UNC6148 is reusing credentials and one-time password (OTP) seeds from prior intrusions, creating a lasting threat that extends beyond typical patching cycles.

The central component of this campaign is the deployment of a new rootkit named OVERSTEP.

This malware represents a significant evolution in attacks targeting network appliances, functioning as both a backdoor and a user-mode rootkit specifically designed for SonicWall SMA devices. OVERSTEP achieves persistence by modifying the appliance’s boot process, injecting itself into the INITRD image, and leveraging the /etc/ld.so.preload mechanism. This sophisticated technique enables the rootkit to intercept system calls from all processes running on the compromised device, establishing an invisible presence that can steal credentials, create reverse shells, and effectively hide its own components from system administrators.

Its primary function revolves around hijacking standard library functions, including open, readdir, and write operations.

When activated, OVERSTEP can receive commands through specific web requests, triggering actions like establishing reverse shells or stealing credentials. The malware specifically targets critical databases such as temp.db and persist.db, which contain sensitive user credentials, session tokens, and OTP seed values. Access to these allows the attackers to maintain continued access even if passwords are reset. Furthermore, OVERSTEP incorporates advanced anti-forensic capabilities, selectively removing log entries from httpd.log, http_request.log, and inotify.log files, severely impeding incident response efforts and making detection much more difficult for security teams.

The discovery of UNC6148’s operations highlights several critical security implications for organizations utilizing SonicWall SMA appliances. While evidence points to the exploitation of known vulnerabilities like CVE-2024-38475, which facilitates unauthenticated database exfiltration via path traversal, the suspected use of an unknown zero-day vulnerability for deploying OVERSTEP suggests that traditional vulnerability management approaches alone may be insufficient against this advanced threat actor. Organizations face an immediate risk of re-compromise, as previously stolen credentials can grant persistent access regardless of firmware updates or applied patches.

GTIG strongly advises all organizations with SMA appliances to conduct comprehensive forensic analysis using disk images, as OVERSTEP’s rootkit capabilities can conceal evidence of compromise from standard live system examination methods. Critical mitigation steps include immediately rotating all credentials, including passwords and OTP bindings, for all users. It’s also crucial to revoke and reissue certificates with private keys stored on the appliances and implement enhanced monitoring for suspicious VPN sessions originating from external IP addresses. The extended timeline of the campaign, with some intrusions occurring months before ransomware deployment, underscores the importance of proactive threat hunting and recognizing the potential for dormant compromises within affected environments.

Reference:

  • Zero-Day RCE Flaw in SonicWall SMA Devices Exploited, Leading to OVERSTEP Ransomware Attacks
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJuly 2025
ADVERTISEMENT

Related Posts

BadIIS Malware Spreads Via SEO Poisoning

Hackers Target AWS and Steal Credentials

September 24, 2025
BadIIS Malware Spreads Via SEO Poisoning

SonicWall SMA100 Update Removes Rootkit

September 24, 2025
BadIIS Malware Spreads Via SEO Poisoning

BadIIS Malware Spreads Via SEO Poisoning

September 24, 2025
FBI Issues Warning on Spoofed IC3 Website

FBI Issues Warning on Spoofed IC3 Website

September 22, 2025
FBI Issues Warning on Spoofed IC3 Website

Infostealer Hits macOS Users Widely

September 22, 2025
FBI Issues Warning on Spoofed IC3 Website

SonicWall Warns Reset After Exposure

September 22, 2025

Latest Alerts

Hackers Target AWS and Steal Credentials

SonicWall SMA100 Update Removes Rootkit

BadIIS Malware Spreads Via SEO Poisoning

SonicWall Warns Reset After Exposure

Infostealer Hits macOS Users Widely

FBI Issues Warning on Spoofed IC3 Website

Subscribe to our newsletter

    Latest Incidents

    Boyd Gaming Reports Data Breach After Attack

    Morrisroe UK Company Hit By Cyber Attack

    GeoServer Flaw Breaches US Agency Network

    Steam Game Steals Streamer Donations

    Ransomware Gang Hacks Spartanburg County

    Cyberattack Hits Europe Airport Systems

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial