Hacker uses the back door to take advantage of Sonicwall Safe Mobile Access to Steal Beliefs Information


  • A threat actor has used a patched vulnerability in Sonicwall — Software
  • The group is tracked like UNC6148
  • This enabled UNC6148 to potentially steal credentials and implement ransomware

An economically motivated threat actor, the track of Google’s threat information group such as UNC6148, has been observed targeted Lapped live-of-Life Sonicwall Secure Mobile Access (SMA) 100 series appliances.

These attacks, Google determine with ‘high confidence’, use credentials and disposable passwords (OTP) seeds obtained through previous instructions that have allowed them to access even after organizations have updated their security.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top