SonicWall Investigates Surge of Cyber Incidents Targeting Firewalls
Overview of the Situation
Cybersecurity provider SonicWall has raised alarms over a significant increase in reported cyber incidents affecting its Gen 7 firewalls. Users are being urged to take proactive measures, particularly with the Secure Sockets Layer Virtual Private Network (SSLVPN) services. This warning comes as the company works to identify the underlying causes of recent security breaches.
Escalating Cyber Threats
In a notice dated August 4, SonicWall revealed that it has observed a troubling spike in both internally and externally reported incidents involving its Gen 7 firewalls with SSLVPN enabled. The company stated, “Over the past 72 hours, there has been a notable increase in cyber incidents.” This spike has led SonicWall to recommend that users disable SSLVPN when possible.
Reports from Security Analysts
SonicWall is collaborating with well-known cybersecurity companies such as Arctic Wolf, Google Mandiant, and Huntress to better understand the nature of these attacks. The company is carefully investigating the situation to see if the incidents are linked to a previously disclosed vulnerability or if a new, unknown vulnerability is being exploited.
External Support and Future Updates
In effort to tackle this growing incident, SonicWall is working with external partners to keep customers informed and to potentially roll out a firmware update if necessary. The company encourages users to take several precautionary steps, including disabling SSLVPN services, limiting connectivity to trusted IP addresses, and enabling multi-factor authentication.
The Threat Landscape According to Huntress
Cybersecurity firm Huntress has issued a stark warning about the current situation. Their Security Operations Center reported a surge in high-severity incidents tied to SonicWall’s Secure Mobile Access (SMA) and associated firewall appliances. According to Huntress, “This isn’t isolated; we’re seeing this alongside our peers at Arctic Wolf, Sophos, and other security firms.” The attacks have been executed at an alarming speed, suggesting the presence of a zero-day vulnerability that is actively being exploited.
Huntress has recorded at least 20 distinct attacks between July 25 and August 3, all following a similar chain of events that culminate in ransomware deployment.
Insights from Arctic Wolf
The analysis from Arctic Wolf elaborates on the methodology of the attacks. They have attributed the malicious activity to the Akira ransomware group, tracing its presence back to July 15. Arctic Wolf noted that they had been tracking similar activities involving SonicWall firewalls since at least October 2024.
They explained, “In contrast with legitimate VPN logins, which typically originate from networks operated by broadband internet service providers, ransomware groups often utilize Virtual Private Server hosting for VPN authentication in compromised environments.” Given the high possibility of a zero-day vulnerability, Arctic Wolf recommends that organizations deactivate SonicWall SSLVPN services until a proper patch is available.
Recommendations for Users
While SonicWall investigates the potential vulnerabilities, users are strongly advised to enhance their security measures. Here are some best practices to consider:
- Disable SSLVPN Services: If you can, turn off this feature to mitigate immediate risks.
- Limit Connectivity: Restrict SSLVPN access to trusted IP addresses to reduce exposure.
- Implement Multi-Factor Authentication: This adds an additional layer of security, making unauthorized access much more difficult.
As the situation develops, it’s crucial for SonicWall users to monitor updates from the company and other security experts. Staying informed and proactive can help safeguard systems against these escalating threats.


