SonicWall warns of imminent ransomware campaign on VPN hardware
Current and legacy secure VPN appliances under attack now


Cyber security company SonicWall has urged customers to patch its enterprise secure VPN hardware to thwart an “imminent ransomware campaign using stolen credentials.”
This week, the company issued a notice saying customers who do not take appropriate actions to mitigate these vulnerabilities on their SRA and SMA 100 series products could be at risk of an attack.
The products in question are those running unpatched and end-of-life (EOL) 8.x firmware. SonicWall said researchers at security firm Mandiant informed SonicWall that threat actors were actively targeting models that are no longer supported.
“SonicWall PSIRT strongly suggests that organizations still using 8.x firmware review the information below and take immediate action,” said the company.
Since at least June, the attacks have been happening when cyber security firm Crowdstrike had warned that attacks against devices were ongoing.
“CrowdStrike Services incident response teams identified eCrime actors leveraging an older SonicWall VPN vulnerability, CVE-2019-7481, that affects Secure Remote Access (SRA) 4600 devices; the ability to leverage the vulnerability to affect SRA devices was previously undisclosed by SonicWall,” it said.
“CrowdStrike Intelligence researchers confirmed that CVE-2019-7481 affects SRA devices running the latest versions of 8.x and 9.x firmware, and that the latest versions of Secure Mobile Access (SMA) firmware do not mitigate the CVE for SRA devices.”
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
SonicWall told customers with end-of-life SMA and SRA devices running firmware 8.x to either update their firmware or disconnect their appliances.
“If your organization is using a legacy SRA appliance that is past end-of-life status and cannot update to 9.x firmware, continued use may result in ransomware exploitation,” the company warned.
Andy Norton, European cyber risk officer at Armis, told ITPro that the immediate requirement for SonicWall customers is to profile their asset estate for SMA and SRA 100 devices and take appropriate isolation action until the patch can be applied or the devices can be retired from service.
“The Cybersecurity Infrastructure Agency, CISA, under the new "StopRansomware" campaign has just announced guidance to stop two bad practices that aid the spread of ransomware,” he said.
RELATED RESOURCE
How to reduce the risk of phishing and ransomware
Top security concerns and tips for mitigation
“The first of which highlights that the use of unsupported (or end-of-life) software in service of Critical Infrastructure and National Critical Functions is dangerous and significantly elevates risk to national security, national economic security, and national public health and safety. This dangerous practice is especially egregious in internet-accessible technologies. This SonicWall announcement ticks the CISA box for 75% of the models that are under attack."
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Prolific ransomware operator added to Europe’s Most Wanted list as US dangles $10 million reward
News The US Department of Justice is offering a reward of up to $10 million for information leading to the arrest of Volodymyr Viktorovych Tymoshchuk, an alleged ransomware criminal.
-
Jaguar Land Rover “did the right thing” shutting down systems to thwart cyber attack
News The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector
-
Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities
News The attack on IT systems supplier Miljödata has impacted public sector services across the country
-
A notorious hacker group is ramping up cloud-based ransomware attacks
News The Storm-0501 threat group is refining its tactics, according to Microsoft, shifting away from traditional endpoint-based attacks and toward cloud-based ransomware.
-
Security researchers have just identified what could be the first ‘AI-powered’ ransomware strain – and it uses OpenAI’s gpt-oss-20b model
News Using OpenAI's gpt-oss:20b model, ‘PromptLock’ generates malicious Lua scripts via the Ollama API.
-
Data I/O shuts down systems in wake of ransomware attack
News Regulatory filings by Data I/O suggest the costs of dealing with the attack could be significant
-
Average ransom payment doubles in a single quarter
News Targeted social engineering and data exfiltration have become the biggest tactics as three major ransomware groups dominate
-
BlackSuit ransomware gang taken down in latest law enforcement sting – but members have already formed a new group
News The notorious gang has seen its servers taken down and bitcoin seized, but may have morphed into a new group called Chaos