ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

SonicWall has been working with Mandiant and other trusted third parties to identify the nature of the threat, which uses stolen credentials to install ransomware on affected devices. This new ransomware threat is described as “imminent,” meaning that you absolutely need to take this seriously. If you don’t, you run the risk of ransomware threats ravaging your technology. Communication has been sent out from SonicWall to affected customers.

Thankfully, the vulnerability that allowed these attacks to occur has been patched in more recent versions of the firmware, although SonicWall does state in its notice, “SonicWall PSIRT strongly suggests that organizations still using 8.x firmware review the information below and take immediate action.” The “information below,” in this case, details which devices are affected, how they are affected, and what must be done to resolve these vulnerabilities. In most cases regarding devices that have reached their end of life, the company recommends taking affected devices offline and resetting all associated credentials, but in the case of devices which are still supported, updating to the most recent firmware should also do the trick. SonicWall also urges users to change passwords and enable multi-factor authentication.

SonicWall apparently understands that it is not always easy to upgrade away from legacy technology. In response to this threat, they issued the following statement: To provide a transition path for customers with end-of-life devices that cannot upgrade to 9.x or 10.x firmware, we’re providing a complimentary virtual SMA 500v until October 31, 2021. This should provide sufficient time to transition to a product that is actively maintained.” It must be mentioned that this is only a short-term solution, not a long-term one.

These types of threats that strike out at software and unsupported firmware which has reached its end of life are not uncommon. All good things must come to an end eventually, including your technology solutions. It is your responsibility to make sure that your organization is only using technology that is currently supported by its developers. Failing to do so is asking for trouble, and you are only shooting yourself in the foot by ignoring them in favor of using older technology.

**Keep in mind, if we’re managing your IT and cybersecurity infrastructure, we’re handling all of your security updates. If you aren’t sure, reach out to us to ensure your agreement covers this type of support.**

ClearView IT can help you address issues with your IT infrastructure where you might still be using older unsupported technologies. We can address any shortcomings with your network and handle the process of upgrading to better, more secure technology. To learn more, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Data Backup Ransomware communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Communication Managed IT Services Data Recovery Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Disaster Recovery Passwords Holiday Apps Browser Windows 10 Managed Service IT Support Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Data Management Remote Work Internet of Things Government Saving Money Operating System Networking Windows Gadgets Artificial Intelligence Workplace Strategy Managed IT services Server Bandwidth WiFi Encryption Mobile Device Management Information App Virtualization Remote Business Technology Spam Blockchain Budget Gmail Apple Office Information Technology Two-factor Authentication History Employee/Employer Relationship Office 365 Conferencing Cybercrime Data Security Big Data BDR Health Analytics Wi-Fi Access Control Compliance Patch Management Remote Monitoring Vendor Cost Management Help Desk Hacking Employer-Employee Relationship IT Management Document Management Training Hacker Save Money Remote Computing Voice over Internet Protocol Augmented Reality Word BYOD Managed Services Computing IBM Website Vendor Management Hard Drive Applications Project Management Search... Vulnerabilities Best Practice Legal Retail Alert Data storage Money Hiring/Firing Data loss Customer Service Outlook Unified Threat Management Firewall Password Mobile Office Cleaning Chrome Windows 7 Free Resource iPhone Robot Education Cortana Paperless Office Content Filtering Antivirus How To Data Breach Mobile Computing Maintenance Router Marketing The Internet of Things Running Cable Twitter YouTube Websites Monitoring Law Enforcement Meetings Storage End of Support Mobility Printer Healthcare Laptop Google Maps Scam Windows 11 Travel User Virtual Reality VPN Sports Social Engineering Social Cryptocurrency SaaS DDoS Black Market Remote Workers Update Managed Services Provider Disaster Virtual Private Network Taxes Politics Settings Machine Learning Virtual Assistant Current Events PowerPoint Lithium-ion battery Administration Solid State Drive Solutions Physical Security Presentation Processor Processors Specifications IT Consultant Integration Chromebook Drones Images 101 Display Automobile Customer Relationship Management Start Menu Computer Care Co-Managed IT Downloads Employees Entertainment How To Avoiding Downtime Multi-factor Authentication Microchip Vulnerability Flexibility Software as a Service Holidays Wireless Technology eWaste Data Protection Saving Time Cooperation Identity Theft Hack Video Conferencing Downtime Notifications Unified Communications Computers Safety Bitcoin Virtual Machines Computer Repair Telephone HIPAA Google Docs Bluetooth Virtual Desktop Distributed Denial of Service Professional Services Experience Office Tips Tech Terms Memory Private Cloud Excel Managed IT Digital Flash SharePoint Workplace Financial Data Fileless Malware Digital Payment Tip of the week Company Culture Telephone Systems Business Growth Risk Management Worker IT Gamification Access Telephone System Regulations Google Apps Time Management Scams Telework Directions Public Cloud Backup and Disaster Recovery Inbound Marketing Recovery Microsoft 365 Desktop Competition Banking Google Wallet Smartwatch Communitications Content Spyware Procurement Electronic Medical Records Accountants Messenger Deep Learning Audit Entrepreneur Cables FinTech LiFi File Sharing Database Documents Electronic Payment Application Business Metrics Hosted Solution Redundancy CES IT Assessment Cache Supply Chain Management Health IT Value Equifax Books Business Intelligence Hard Drive Disposal Language Society Unified Threat Management Point of Sale Organization Workers Cyber security Tactics Smart Devices Username Securty Phone System Visible Light Communication Shortcuts Remote Working CCTV Startup Domains Reading Freedom of Information Monitors Printing email scam Windows 8 Touchscreen AI Navigation Trend Micro Addiction Electronic Health Records Computer Malfunction Transportation Mobile Security Emergency Digital Security Cameras Advertising Vendor Mangement Be Proactive User Tip Wasting Time Legislation Relocation News Displays Modem Computer Accessories Work/Life Balance Tech Support Evernote Samsung eCommerce Network Management Surveillance Webcam Public Speaking Videos Uninterrupted Power Supply Business Mangement Workplace Strategies Proxy Server Streaming Media Managing Costs Emails Fake News SSID Computing Infrastructure Keyboard Tablets Service Level Agreement In Internet of Things Development Management Employer/Employee Relationships Device security Hard Drives Hacks Network Congestion Media Supercomputer Virtual Machine Wireless Headphones Reliable Computing Microsoft Excel intranet Writing Google Calendar Business Cards Shortcut Virus Reviews Tech Optimization Going Green Wireless Error Motion Sickness Teamwork Heating/Cooling Environment 2FA Comparison Google Drive Smart Technology Data Storage Bookmark Windows XP Hypervisor Troubleshooting Scalability Social Networking Administrator Medical IT Piracy Text Messaging Proactive IT Shopping Term Download Corporate Profile SQL Server HTML Bring Your Own Device Knowledge Paperless Television Telephony PCI DSS Browsers Employer Employee Relationship Licensing Nanotechnology Software License Music Gig Economy Google Play Cabling Humor Upload Tablet Internet Service Provider Social Network G Suite Azure Business Communications Mouse VoIP Supply Chain Regulations Compliance Data Analysis Tracking Managed IT Service Screen Reader Business Owner Botnet Mobile Technology Security Cameras Memes Trends Staffing Net Neutrality Customer Resource management Web Server Devices IP Address Rental Service Micrsooft Human Resources

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?