October 13, 2025: Sonic Wall has warned ALL customers to reset their MySonicWall account credentials in order to protect firewall configuration backup files that could allow unauthorized threat actors access who have breached SonicWalls’s systems.
As of September 17, 2025, SonicWall confirmed that an unauthorized party accessed firewall configuration backup files stored in its MySonicWall cloud backup environment.
These threat actors are logging into multiple SSSL VPN accounts of compromised devices using valid credentials that were encrypted, which poses a high risk to any affected organizations, according to SonicWall.
What is the Impact of the SonicWall Cloud Backup Breach?
Firewalls and SSL VPNs are common remote access points for vendors and staff. If backup files or credentials are abused, attackers can gain remote access to critical systems, potentially tampering with firewalls, taking critical systems offline, exfiltrating PII, and move laterally throughout your network.
SonicWall Cloud Backup Breach Mitigation Recommendations
Immediate actions we recommend if your organization uses Sonic Wall’s Cloud Backup Service:
SecuLore Guidance For SonicWall Security Breach
Check your device to updates and see if your device is affected, according to SonicWall and your admins can follow a detailed guide they have provided.
Attackers with valid credentials can blend in to your environment, making detection much more challenging.
That’s why it’s important to have logs reviewed, identify unusual VPN logins or unusual hours, look for unexplained configurations, changes to role-based access including to sensitive systems that are unusual for certain accounts.
Additional Actions Actions Critical Networks Should Take
If you’re unsure how exposed your agency is, a Vulnerability Risk Assessment can help identify weaknesses before attackers do.
SecuLore’s continuous, passive monitoring allows threats to be detected early before attackers gain persistence. Our cybersecurity analysts continuously monitor activity patterns across PSAP and ECC environments nationwide to detect anomalies in logins to instances such as firewalls or VPNS.
For agencies already dealing with staffing and operational pressures, a network compromise could directly impact public safety missions.
What Public Safety Agencies Should Do Now
Awareness is the first step to your cyber defense strategies.
Other Alerts
- SonicWall Breach – Backup Files Exposed: Advice for Critical Networks
2025-10-13
- Update – Cisco ASA Zero-Day Attacks: What Public Safety Agencies Need to Know
2025-09-09
- Cyber Alert: Mitel and Oracle Vulnerabilities
2025-01-13
- Cyber Alert: Ivanti Connect Secure Flaw
2025-01-13
- Cyber Alert: Zyxel Firewall Vulnerability
2024-12-05
Cybersecurity for Critical Infrastructure
SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.
