In a significant and concerning development, firewall vendor SonicWall has announced a major escalation of its recent security breach. Following an investigation conducted with Mandiant, the company confirmed on October 6, 2025, that an unauthorized party accessed and stole the firewall configuration backup files for 100% of customers using its cloud backup feature via the MySonicWall portal. This revelation is a drastic revision of the company's initial assessment from September 17, 2025, which downplayed the impact to just 5% of its firewall install base. While credentials within the backups are encrypted, the complete exposure of network configurations for all cloud backup users provides a treasure trove of intelligence for threat actors planning future attacks.
The breach targeted the MySonicWall.com portal, a centralized cloud platform that customers use for product registration, licensing, and, critically, backing up their firewall device configurations. The threat actor successfully compromised this portal and exfiltrated the configuration backup files for every customer who had ever used the service. This represents a serious supply-chain and systemic risk, as the compromise of a single vendor platform has led to the potential exposure of detailed security information for a vast number of downstream customers.
The stolen configuration files are a blueprint of a customer's network security posture. Even with encrypted credentials, these files contain a wealth of sensitive information that can be used for attack planning:
T1595 - Active Scanning): Complete firewall rule sets, revealing which ports are open, what services are exposed, and access control lists (ACLs) between network zones.While SonicWall states the credentials (e.g., local admin passwords, VPN pre-shared keys) within these files are encrypted, a determined attacker could attempt offline cracking. More importantly, the configuration data itself allows for highly effective and targeted reconnaissance without needing to decrypt the secrets.
The impact of this breach is severe and long-lasting for affected SonicWall customers:
Detection efforts must now focus on identifying follow-on attacks that leverage the stolen data.
| Type | Value | Description |
|---|---|---|
| network_traffic_pattern | Probing/scanning from unknown IPs against ports that are allowed by firewall rules. | Attackers may use the stolen configs to identify and target services that are intentionally exposed. |
| email_address | Spearphishing emails containing specific internal hostnames or usernames. | Emails that show insider knowledge of the network architecture are highly suspicious. |
| log_source | SonicWall Firewall Logs | Monitor for a sudden increase in blocked traffic that appears to be testing the limits of firewall rules, or successful connections from unusual sources. |
D3-UBA: User Behavior Analysis to detect when attackers use stolen knowledge to impersonate legitimate users or access patterns.SonicWall is urging all affected customers to take immediate action:
D3-ANCI: Authentication Cache Invalidation (i.e., changing all passwords). Following that, implementing D3-MFA: Multi-factor Authentication is the most effective long-term control.Immediately change all passwords and secrets contained within the SonicWall configuration.
Mapped D3FEND Techniques:
Enforce MFA on all administrative and VPN accounts to prevent access even if credentials are cracked.
Mapped D3FEND Techniques:
Given that SonicWall firewall configuration backups containing encrypted credentials were stolen, the immediate priority is to assume all secrets are compromised. Affected organizations must perform a full credential rotation. This involves changing all passwords for local firewall administrator accounts, rotating all VPN pre-shared keys, and updating any other secrets stored in the configuration (e.g., RADIUS secrets, SNMP community strings). This action, a form of authentication cache invalidation, immediately renders the stolen encrypted credentials useless, even if the attackers manage to crack them. This is the most critical first step in responding to the breach.
To build long-term resilience after the credential rotation, organizations must enable multi-factor authentication (MFA) on all SonicWall management interfaces and remote access VPNs. The breach provides attackers with the knowledge of which accounts exist and what services they can access. MFA provides a robust second layer of security that prevents unauthorized access even if an attacker possesses a valid password. This is the most effective control to mitigate the risk of credential-based attacks that are likely to follow this breach. All administrative access should require MFA without exception.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats