SonicWall has admitted that it’s been the target of a cyber attack which saw hackers take advantage of zero-day vulnerabilities in its secure remote access products.
The company stated that it had “identified a coordinated attack on its internal systems by highly sophisticated threat actors exploiting probable zero-day vulnerabilities on certain SonicWall secure remote access products”.
The company didn’t specify when exactly the incident took place. CloudPro contacted SonicWall for a timeline of the attack but is yet to receive a response from the company.
Over the weekend, SonicWall issued an additional statement which ruled out that its NetExtender VPN Client product had been compromised, adding that the only products to remain under investigation are from the SMA 100 series which “provide Secure, Mobile and Remote Access” to SMBs.
However, SonicWall clarified that, despite the investigation, all “SMA 100 series products may be used safely in common deployment use cases”.
The company also said that it “fully understands the challenges previous guidance had in a work-from-home environment, but the communicated steps were measured and purposeful in ensuring the safety and security of [its] global community of customers and partners”.
“As the front line of cyber defense, we have seen a dramatic surge in cyberattacks on governments and businesses, specifically on firms that provide critical infrastructure and security controls to those organizations,” it added.
Despite a decline in the number of security incidents, the last year was deemed as the worst for data breaches on record.
The news of the incident comes months after SonicWall released patches for a critical vulnerability in the SonicOS operating system, which is responsible for running SonicWall virtual private network (VPN) appliances.