Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Honda Boosts Cyber Resilience with Macrium Across U.S. Manufacturing

March 30, 2026

Critical Vulnerability in Fortinet FortiClient EMS Under Attack

March 30, 2026

Critical Infrastructure at Risk: Nation-State Attacks Target Exposed ICS and OT Devices

March 30, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » SonicWall Launches Firmware Update to Block Rootkit Malware “OVERSTEP” on SMA Devices
Cybercrime and Ransomware

SonicWall Launches Firmware Update to Block Rootkit Malware “OVERSTEP” on SMA Devices

Staff WriterBy Staff WriterSeptember 23, 2025No Comments4 Mins Read1 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Essential Insights

  1. SonicWall urgently released firmware 10.2.2.2-92sv to address a known rootkit malware (OVERSTEP) on SMA 100 series devices, especially targeting end-of-life models approaching support end on October 1, 2025.
  2. The update incorporates enhanced file-checking to detect and remove malicious software, blocking persistent threats and exfiltration of sensitive data like credentials and OTP seeds.
  3. The threat, linked to a campaign by UNC6148, exploited vulnerabilities and web shells on compromised devices, emphasizing the critical need for immediate patching to prevent active exploitation.
  4. SonicWall urges all affected users to apply the firmware immediately, review logs, reset credentials, and reinitialize OTPs—no workaround exists, and the vulnerability does not affect other series like the SMA 1000 or firewall SSL-VPNs.

What’s the Problem?

In September 2025, SonicWall issued an urgent firmware update (version 10.2.2.2-92sv) for its Secure Mobile Access (SMA) 100 series appliances, following a detailed report from Google’s Threat Intelligence Group (GTIG). The report revealed that a sophisticated rootkit malware called OVERSTEP had been actively targeting end-of-life SMA devices—specifically models 210, 410, and 500v—compromising them with malicious components that allowed persistent access, data theft, and remote control. The malware was deployed by a threat actor dubbed UNC6148, exploiting vulnerabilities on devices nearing their support expiration date of October 1, 2025, despite the fact that Google couldn’t conclusively identify how the initial compromise occurred. SonicWall’s update addresses these threats by adding enhanced file integrity checks designed to purge malware, but it is vital for users to act immediately, especially given that attackers, possibly linked to earlier ransomware campaigns like Abyss, had already exploited these vulnerabilities for long-term data exfiltration, including credentials and certificates.

This security incident was reported by SonicWall itself, which highlighted both the severity and urgency of the threat, emphasizing that their timely firmware patch is the primary defense now available against ongoing exploitation. The company announced that earlier fixes for other vulnerabilities earlier in 2025, such as remote code execution flaws, were insufficient against these persistent threats, making the new update critical for preventing further system breaches. SonicWall urges administrators to immediately implement the update, review logs for signs of intrusion, reset credentials, and reinitialize security features to safeguard their networks—especially since the compromised devices are approaching their end-of-support lifecycle, leaving them especially vulnerable to sustained cyberattacks.

Risk Summary

SonicWall’s urgent release of firmware version 10.2.2.2-92sv for its SMA 100 series appliances aims to counteract a sophisticated cyber threat involving the OVERSTEP rootkit malware, which was actively exploited on end-of-life devices nearing their support deadline. This malware grants attackers persistent access, allows them to establish reverse shells, and exfiltrate sensitive data such as credentials and certificates, posing severe risks of unauthorized access, data breaches, and ongoing control over compromised systems. The attack, linked to the UNC6148 group and detailed in a July 2025 report by Google’s Threat Intelligence Group, underscores the danger posed by long-term malware embedded within vulnerable appliances—especially as many devices approach their end-of-support, leaving organizations exposed to exploitation, ransomware deployment, and lateral movement within networks. SonicWall’s update directly confronts these active threats, emphasizing immediate implementation to mitigate further breaches, with recommendations to review logs, reset credentials, and reinitialize OTP settings beforehand, reflecting the critical importance of timely security measures in safeguarding organizational assets against persistent, highly targeted cyber risks.

Fix & Mitigation

Ensuring rapid response to firmware vulnerabilities like the SonicWall rootkit malware "OVERSTEP" is crucial to safeguarding network integrity and preventing extensive damage. Prompt remediation helps limit potential data breaches, unauthorized access, and system disruptions that could escalate if left unaddressed.

Mitigation Steps

  • Apply Firmware Update: Install SonicWall’s latest firmware patch immediately.
  • Isolate Compromised Devices: Disconnect affected SMA devices from the network to prevent spread.
  • Conduct Vulnerability Scanning: Use security tools to identify signs of compromise across the network.
  • Reset Devices: Perform factory resets on affected devices to eliminate malware presence.
  • Monitor Traffic: Watch network activity for unusual behavior indicating ongoing malicious activity.
  • Strengthen Security: Implement stricter access controls and multi-factor authentication to prevent future attacks.

Advance Your Cyber Knowledge

Discover cutting-edge developments in Emerging Tech and industry Insights.

Learn more about global cybersecurity standards through the NIST Cybersecurity Framework.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1

CISO Update Cybersecurity MX1
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleUnlocking AI: Transforming Controls into Accelerators
Next Article Reinventing Incident Remediation: A CISO’s Essential Shift
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Honda Boosts Cyber Resilience with Macrium Across U.S. Manufacturing

March 30, 2026

Critical Vulnerability in Fortinet FortiClient EMS Under Attack

March 30, 2026

Critical Infrastructure at Risk: Nation-State Attacks Target Exposed ICS and OT Devices

March 30, 2026

Comments are closed.

Latest Posts

Honda Boosts Cyber Resilience with Macrium Across U.S. Manufacturing

March 30, 2026

Critical Vulnerability in Fortinet FortiClient EMS Under Attack

March 30, 2026

Critical Infrastructure at Risk: Nation-State Attacks Target Exposed ICS and OT Devices

March 30, 2026

VoidLink Malware Framework: AI-Assisted Attacks Are Here to Stay

March 30, 2026
Don't Miss

Honda Boosts Cyber Resilience with Macrium Across U.S. Manufacturing

By Staff WriterMarch 30, 2026

Fast Facts Honda has partnered with Macrium Software to enhance recovery readiness and minimize costly…

Critical Vulnerability in Fortinet FortiClient EMS Under Attack

March 30, 2026

Critical Infrastructure at Risk: Nation-State Attacks Target Exposed ICS and OT Devices

March 30, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Honda Boosts Cyber Resilience with Macrium Across U.S. Manufacturing
  • Critical Vulnerability in Fortinet FortiClient EMS Under Attack
  • Critical Infrastructure at Risk: Nation-State Attacks Target Exposed ICS and OT Devices
  • VoidLink Malware Framework: AI-Assisted Attacks Are Here to Stay
  • Top 10 Fraud Detection Tools to Watch in 2026
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Honda Boosts Cyber Resilience with Macrium Across U.S. Manufacturing

March 30, 2026

Critical Vulnerability in Fortinet FortiClient EMS Under Attack

March 30, 2026

Critical Infrastructure at Risk: Nation-State Attacks Target Exposed ICS and OT Devices

March 30, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202629 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202515 Views

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.