Published: Tue 05 August 2025
Prepared by: Adam Skupien, Vulnerability Security Analyst
This bulletin addresses the recent surge in ransomware activity targeting SonicWall SSL VPN devices for initial access. The team at Arctic Wolf has observed multiple instances of intrusions involving VPN access through SonicWall SSL VPNs which were closely followed by deployment of Akira ransomware within the network. A patch to mitigate this vulnerability has not been released by SonicWall at this time.
On 1 August 2025, Arctic Wolf published a blog covering their discovery of an uptick in threat-actor activity targeting SonicWall firewall devices. This activity led to initial access, shortly followed by ransomware being deployed within the network. It was noted that the ransomware activity started as early as 15 July 2025.
On 4 August 2025 SonicWall released an advisory confirming that there has been a notable increase in both internally and externally reported cyber incidents involving Gen 7 SonicWall firewalls where SSL VPN is enabled.
No specific vulnerabilities have been associated with this activity at this time, however, instances of fully patched SonicWall devices with rotated credentials were also seen affected suggesting the existence of a zero-day vulnerability. Accounts with TOTP MFA enabled were also seen compromised in some instances.
Successful exploitation appears to provide remote unauthenticated threat actors with high level access to the SonicWall devices, allowing them to pivot to the internal network to deploy the ransomware.
Organisations should disable their SonicWall SSL VPN service until a patch is made available as this appears to be the initial access vector.
Triskele Labs recommends that Endpoint Detection and Response (EDR) should be universally deployed across the environment and correctly configured, including on the VPN server.
SonicWall SSL VPN servers should be configured and hardened according to SonicWall best practices guidelines.
IP addresses accessing the VPN should be restricted to a list of whitelisted addresses if possible, and geo-restricted to reduce attack surface.
Unused and inactive accounts should be deleted on the device.
Arctic Wolf have provided a list of Autonomous System Numbers (ASN) associated with the observed threat-actor campaign which could be restricted from accessing the VPN through their CIDR ranges, to reduce overall exposure:
ASN | Organisation Name |
AS23470 | ReliableSite.Net LLC |
AS215540 | Global Connectivity Solutions LLP |
AS64236 | UnReal Servers, LLC |
AS14315 | 1GSERVERS, LLC |
AS62240 | Clouvider Limited |
It should be noted however, that the networks above are not inherently malicious and that blocking traffic from these entirely without limiting to VPN authentication could disrupt routine operations.
Logs should be reviewed for suspicious authentication attempts on the VPN, and signs of lateral movement investigated. Privileged account activity should be monitored closely.
Suspicious data transfer activity should be investigated for signs of exfiltration.
Triskele Labs customers leveraging our Monitor (24×7 SIEM) or MDR services are being proactively assessed and monitored for IoC and signs of lateral movement.