Marquis Software Solutions, a provider of data analytics tools for financial institutions, has filed a lawsuit against cybersecurity vendor SonicWall, alleging that a security failure at SonicWall was the root cause of a ransomware attack against Marquis. The complaint, filed on February 25, 2026, claims that a 2025 breach of SonicWall's MySonicWall cloud service exposed sensitive configuration data for Marquis's firewall. This data, including unencrypted MFA scratch codes, was allegedly used by attackers to bypass security controls and execute a ransomware attack in August 2025. The attack caused significant disruption for 74 of Marquis's banking clients. This lawsuit represents a critical test of vendor liability in the context of supply chain security.
The lawsuit outlines a complex supply chain attack. The core allegation is that a vulnerability in SonicWall's systems led to the compromise of Marquis, one of its customers.
MySonicWall cloud backup service.Marquis accuses SonicWall of gross negligence for storing MFA scratch codes in an unencrypted format and for failing to notify them that their firewall's security posture had been compromised by the vendor's own breach.
This incident is a prime example of a Trusted Relationship attack (T1199), where an organization is compromised by exploiting its reliance on a third-party vendor. The key technical failures alleged in the lawsuit are:
The impact of this supply chain attack is multi-faceted and severe:
No specific technical IOCs related to the ransomware attack itself have been disclosed in the legal filings.
Platform Hardening (D3-PH).New details emerge on SonicWall API flaw, revealing attackers guessed serial numbers to download unauthenticated backups with plaintext MFA codes. Marquis now faces 36 class-action lawsuits.
Implementing a strong Third-Party Risk Management (TPRM) program to vet the security practices of all vendors is critical.
Ensuring that vendors implement MFA securely, without insecure fallback mechanisms like unencrypted scratch codes.
Mapped D3FEND Techniques:
This incident highlights a catastrophic failure in configuration management by the vendor. For SonicWall and other service providers, this means implementing strict hardening standards for how customer data is stored. Sensitive information like MFA scratch codes must never be stored in plaintext. They should be encrypted at rest, and access should be tightly controlled and logged. For customers like Marquis, this means demanding transparency from vendors about their data handling practices. Organizations should ask vendors specifically how their configuration backups are secured and what protections are in place for sensitive elements like credentials and recovery codes. If a vendor cannot provide satisfactory answers, alternative solutions should be considered.
To detect the abuse of stolen MFA codes, organizations should implement authentication event thresholding and alerting. The use of an emergency scratch code is a high-risk, low-frequency event that should immediately trigger a high-priority alert to the security team for investigation. The alert should contain context such as the user account, source IP address, and time of access. This allows the security team to quickly verify the legitimacy of the action with the user. If the user did not initiate the access, it is a clear sign of an account takeover in progress, enabling a rapid response to lock the account and invalidate the session before the attacker can cause further harm.
To defend against the misuse of legitimate-seeming access, organizations should analyze resource access patterns. In this case, even if the attacker used a valid MFA code to authenticate, their subsequent actions would likely deviate from normal administrative behavior. A UEBA (User and Entity Behavior Analytics) system could detect that an account, after authenticating from an unusual location, immediately began modifying critical firewall rules or attempting to access sensitive network segments. By baselining normal administrative activity for the SonicWall firewall, any significant deviation—such as a series of rapid, unusual rule changes—would be flagged as suspicious, providing another opportunity for detection beyond the initial authentication event.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats