CybersecurityNewswireTechnology

Google Uncovers Custom Backdoor on SonicWall Devices

▼ Summary

– Hackers are targeting end-of-life SonicWall Secure Mobile Access (SMA) appliances, which lack regular security updates, leaving them vulnerable.
Google Threat Intelligence Group (GTIG) advises organizations using SMA appliances to check for compromises and acquire disk images for forensic analysis.
– The hacking group, UNC6148, exploits leaked local administrator credentials, but the source of these credentials remains unknown.
– UNC6148 uses a custom backdoor malware called Overstep, which deletes log entries to hinder forensic investigations.
Researchers suspect UNC6148 may possess a zero-day exploit, targeting an undisclosed vulnerability in the SMA appliances.

Google researchers have uncovered a sophisticated cyberattack targeting outdated SonicWall Secure Mobile Access (SMA) appliances, devices widely used to manage remote network access for enterprises. The threat, attributed to a hacking group dubbed UNC6148, involves a custom-built backdoor malware named Overstep, designed to evade detection and erase forensic evidence.

The compromised devices are no longer supported by security updates, leaving them vulnerable to exploitation. Despite their end-of-life status, many organizations still rely on these appliances, making them attractive targets. Google’s Threat Intelligence Group (GTIG) has urged affected businesses to conduct immediate forensic analysis, recommending disk imaging to bypass the malware’s anti-forensic capabilities.

Key details about the attack remain unclear, including how the hackers obtained the leaked administrator credentials used to breach the systems. The attackers’ exact motives and post-compromise activities are also unknown, though Overstep’s ability to selectively delete log entries suggests a deliberate effort to cover their tracks.

Security experts suspect UNC6148 may be leveraging a zero-day exploit, a previously unknown vulnerability, to infiltrate the devices. While the specific weaknesses being exploited are still under investigation, the group’s tactics highlight the risks of running outdated network hardware. Organizations using SonicWall SMA appliances are advised to upgrade to supported models and implement rigorous monitoring to detect potential intrusions.

The discovery underscores the growing sophistication of cyber threats targeting legacy infrastructure. Proactive security measures, including timely patching and credential management, are critical to mitigating such risks. Without decisive action, businesses risk exposing their networks to persistent, hard-to-detect breaches.

(Source: Ars Technica)

Topics

sonicwall secure mobile access sma appliances 95% unc6148 hacking group 90% overstep malware 88% google threat intelligence group gtig 85% leaked administrator credentials 80% zero-day exploit 75% forensic analysis 70% legacy infrastructure risks 65% proactive security measures 60%