SonicWall Breach: When Firewalls Need a Firewall!
SonicWall has revealed that a state-sponsored threat actor was behind the September hack where firewall configuration files were swiped from its cloud backup service. The stolen files contain encrypted credentials, posing a risk for targeted attacks. SonicWall customers are advised to immediately secure their devices.

Hot Take:
Looks like SonicWall just got a not-so-sonic reality check! When your firewall is breached by a state-sponsored threat actor, it’s time to hit the reset button – literally, on all your passwords. Who knew the cloud could rain on your parade with a drizzle of encrypted credentials?
Key Points:
– SonicWall confirmed a state-sponsored threat actor was behind the September hack.
– Initially, less than 5% of customers’ data was reported stolen; this was later revised to all firewall preference files.
– The stolen files contain encrypted credentials and configuration data.
– SonicWall’s investigation, conducted with Mandiant, is complete and remediation actions are underway.
– Customers are advised to check firewall backups and reset passwords to mitigate risk.
