ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

SonicWall has been working with Mandiant and other trusted third parties to identify the nature of the threat, which uses stolen credentials to install ransomware on affected devices. This new ransomware threat is described as “imminent,” meaning that you absolutely need to take this seriously. If you don’t, you run the risk of ransomware threats ravaging your technology. Communication has been sent out from SonicWall to affected customers.

Thankfully, the vulnerability that allowed these attacks to occur has been patched in more recent versions of the firmware, although SonicWall does state in its notice, “SonicWall PSIRT strongly suggests that organizations still using 8.x firmware review the information below and take immediate action.” The “information below,” in this case, details which devices are affected, how they are affected, and what must be done to resolve these vulnerabilities. In most cases regarding devices that have reached their end of life, the company recommends taking affected devices offline and resetting all associated credentials, but in the case of devices which are still supported, updating to the most recent firmware should also do the trick. SonicWall also urges users to change passwords and enable multi-factor authentication.

SonicWall apparently understands that it is not always easy to upgrade away from legacy technology. In response to this threat, they issued the following statement: To provide a transition path for customers with end-of-life devices that cannot upgrade to 9.x or 10.x firmware, we’re providing a complimentary virtual SMA 500v until October 31, 2021. This should provide sufficient time to transition to a product that is actively maintained.” It must be mentioned that this is only a short-term solution, not a long-term one.

These types of threats that strike out at software and unsupported firmware which has reached its end of life are not uncommon. All good things must come to an end eventually, including your technology solutions. It is your responsibility to make sure that your organization is only using technology that is currently supported by its developers. Failing to do so is asking for trouble, and you are only shooting yourself in the foot by ignoring them in favor of using older technology.

**Keep in mind, if we’re managing your IT and cybersecurity infrastructure, we’re handling all of your security updates. If you aren’t sure, reach out to us to ensure your agreement covers this type of support.**

ClearView IT can help you address issues with your IT infrastructure where you might still be using older unsupported technologies. We can address any shortcomings with your network and handle the process of upgrading to better, more secure technology. To learn more, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Communication Data Recovery Managed IT Services Productivity Quick Tips VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Disaster Recovery Passwords Holiday Browser Managed Service Apps IT Support Windows 10 Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Remote Work Data Management Internet of Things Saving Money Operating System Government Networking Windows Gadgets Workplace Strategy Artificial Intelligence Managed IT services Blockchain Mobile Device Management App Business Technology Virtualization Information Spam Remote Server Bandwidth WiFi Encryption Gmail Office Apple Two-factor Authentication Information Technology Office 365 History Employee/Employer Relationship Budget BDR Big Data Conferencing Health Access Control Data Security Analytics Cybercrime Wi-Fi Help Desk Hacking Cost Management IT Management Training Employer-Employee Relationship Vendor Document Management Hacker Save Money Patch Management Voice over Internet Protocol Remote Computing Compliance Remote Monitoring IBM Website Computing Data loss Vendor Management Hard Drive Search... Legal Best Practice Applications Retail Data storage Money Alert Vulnerabilities Customer Service Unified Threat Management Hiring/Firing Firewall Outlook Mobile Office Augmented Reality Password Word Project Management Managed Services BYOD How To Websites Router Mobility Meetings Mobile Computing The Internet of Things YouTube Marketing Twitter Google Maps Scam Running Cable Law Enforcement End of Support Data Breach Laptop Printer Storage VPN Update Windows 11 Social Sports Travel Monitoring SaaS DDoS Virtual Reality User Healthcare Social Engineering Cryptocurrency Paperless Office Remote Workers Antivirus Black Market iPhone Cleaning Maintenance Education Cortana Windows 7 Robot Free Resource Content Filtering Chrome Current Events Start Menu Solid State Drive Downloads Computer Care PowerPoint Processors Excel Solutions Administration Vulnerability Presentation Images 101 Chromebook Software as a Service Drones Integration Data Protection Display Specifications Automobile IT Consultant Virtual Assistant How To Employees Customer Relationship Management Co-Managed IT Wireless Technology Microchip Avoiding Downtime eWaste Entertainment Flexibility Holidays Processor Downtime Tech Terms Hack Safety Identity Theft Cooperation Notifications Managed IT Video Conferencing Digital Unified Communications Virtual Desktop Virtual Machines Experience Computer Repair Google Docs Bluetooth Multi-factor Authentication Taxes Distributed Denial of Service Professional Services HIPAA Office Tips Memory Private Cloud Saving Time Disaster Managed Services Provider Physical Security Computers Bitcoin Politics Virtual Private Network Telephone Settings Lithium-ion battery Machine Learning LiFi Browsers Smartwatch Banking Touchscreen Nanotechnology Communitications Entrepreneur Google Wallet Microsoft 365 Cables Software License Computer Malfunction Inbound Marketing Google Play Documents Messenger Emergency Upload Procurement Application Deep Learning Social Network FinTech Vendor Mangement Business Intelligence Data Analysis CES Business Metrics Screen Reader IT Assessment Hosted Solution Samsung Point of Sale Uninterrupted Power Supply Mobile Technology Value Webcam Security Cameras Securty Books Trends Supply Chain Management Customer Resource management Organization Domains Language Business Mangement Devices Cyber security Society Shortcuts Electronic Payment Fileless Malware Smart Devices Tablets Tip of the week Monitors Company Culture Visible Light Communication Reading Gamification Remote Working Google Calendar Telephone System AI Regulations Trend Micro Windows 8 Supercomputer Be Proactive Phone System Directions Digital Security Cameras Virus Backup and Disaster Recovery Electronic Health Records Transportation Public Speaking Displays Desktop Wasting Time Advertising Motion Sickness Relocation Content Streaming Media Comparison Electronic Medical Records Work/Life Balance Google Drive Accountants eCommerce Tech Support Modem Workplace Strategies Videos Database Surveillance Keyboard Hard Drives Corporate Profile Managing Costs Computer Accessories Knowledge In Internet of Things Television Health IT Telephony Equifax intranet Employer Employee Relationship SSID Media Wireless Hacks Tactics Development Shortcut Network Congestion Cabling Hard Drive Disposal Employer/Employee Relationships Heating/Cooling Writing Tablet Virtual Machine Environment G Suite Reliable Computing Username Windows XP Mouse Reviews VoIP Startup Optimization Social Networking Tracking Freedom of Information Smart Technology Navigation 2FA Addiction email scam Teamwork Mobile Security Hypervisor Web Server Scalability Data Storage Administrator SharePoint User Tip Shopping Text Messaging Legislation Proactive IT Digital Payment News Medical IT Troubleshooting Evernote Paperless Bring Your Own Device Network Management Worker SQL Server Access Licensing PCI DSS Proxy Server Gig Economy Time Management Emails Humor Music Public Cloud Fake News Supply Chain Business Communications Staffing Service Level Agreement Internet Service Provider Computing Infrastructure Azure IP Address Spyware Device security Managed IT Service Audit Management Regulations Compliance Botnet Wireless Headphones Memes File Sharing Microsoft Excel Workplace Business Owner Tech Human Resources Rental Service Redundancy Going Green Net Neutrality Micrsooft Business Cards Flash Cache Error Financial Data Bookmark Risk Management Telephone Systems Unified Threat Management IT Business Growth Workers Scams Term Google Apps Recovery Download Competition Piracy Telework HTML CCTV Printing

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?