Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Cyberattack Disrupts Ambulance Response at Signature Healthcare

April 20, 2026

Vercel Employee AI Tool Access Triggers Data Breach

April 20, 2026

New JanaWare Ransomware Targets Turkish Users via Customized Adwind RAT

April 20, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » SonicWall Launches SMA100 Firmware Update to Eradicate Rootkit Malware
Cybercrime and Ransomware

SonicWall Launches SMA100 Firmware Update to Eradicate Rootkit Malware

Staff WriterBy Staff WriterSeptember 24, 2025No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Quick Takeaways

  1. SonicWall released firmware 10.2.2.2-92sv to help remove rootkit malware, specifically targeting SMA 100 series devices, following reports of attacks deploying OVERSTEP malware.
  2. OverSTEP is a user-mode rootkit that grants persistent access, stealing sensitive files and credentials, with overlaps noted with Abyss ransomware incidents.
  3. Researchers warn that using outdated SMA firmware poses significant risks, urging users to upgrade to security-compliant versions immediately.
  4. SonicWall also addressed recent threats like credential theft from backup files and clarified that the Akira ransomware gang is exploiting a previously patched vulnerability (CVE-2024-40766).

The Core Issue

SonicWall has released a crucial firmware update, version 10.2.2.2-92sv, specifically designed to detect and eliminate rootkit malware on SMA 100 series devices, including the SMA 210, 410, and 500v models. This update was prompted by findings from Google Threat Intelligence Group (GTIG) that revealed a cyber threat group known as UNC6148 deploying a sophisticated rootkit called OVERSTEP on these devices, many of which are nearing their end of support on October 1, 2025. OVERSTEP malware is particularly insidious because it operates in user mode, allowing attackers to maintain persistent access by hiding malicious components, stealing sensitive data such as credentials and certificates, and establishing reverse shells for continuous control. Although the specific goals of these attacks remain unclear, there are concerning overlaps with other ransomware activities, notably those linked to the Abyss group, which has previously compromised SMA devices to install malicious web shells.

The story is reported by SonicWall, a cybersecurity company that actively monitors and responds to threats affecting its customer base. The company has been advising users to promptly upgrade their firmware to mitigate risks associated with older, vulnerable versions, especially given the rising frequency of cyberattacks exploiting unpatched systems. SonicWall’s warnings also extend to recent attacks where hackers, like the notorious Akira ransomware gang, exploited vulnerabilities (such as CVE-2024-40766) to target unpatched firewalls, underscoring the ongoing threat landscape. These developments highlight the importance of regular updates and robust security measures to defend against evolving malware threats and ensure the safety of network infrastructure.

Critical Concerns

Cyber risks pose significant threats to organizations, exemplified by SonicWall’s recent firmware update targeting rootkit malware on SMA 100 series devices, which are being exploited by threat actors like UNC6148 using OVERSTEP malware to establish persistent, stealthy access, steal sensitive data, and potentially deploy ransomware such as Abyss. These risks are compounded by vulnerabilities in outdated firmware and weak credential practices, with studies revealing that nearly half of environments have experienced successful password cracking—almost doubling last year’s rate—highlighting vulnerabilities that adversaries exploit via brute-force and zero-day exploits. The impact of such cyber threats can be devastating, resulting in unauthorized access, data exfiltration, system compromise, and disruption of critical services, underscoring the urgent need for timely firmware updates, robust security protocols, and vigilant monitoring to mitigate potentially severe financial and reputational damage.

Fix & Mitigation

Maintaining swift and effective remediation for SonicWall’s SMA100 firmware update addressing rootkit malware is crucial to prevent extensive security breaches and protect sensitive data. Prompt action ensures the integrity of communication channels and minimizes downtime, safeguarding organizational assets from persistent threats.

Mitigation Steps

  • Immediate Firmware Update: Install the latest firmware released by SonicWall to eliminate vulnerabilities.
  • System Backup: Create a full backup before updating to preserve current configurations and facilitate recovery.
  • Network Segmentation: Isolate affected systems to prevent malware spread across the network.
  • Enhanced Monitoring: Increase surveillance of network traffic for unusual activity indicative of malware presence.
  • Password Reset: Change all administrative and user passwords to prevent unauthorized access.
  • Malware Scan: Conduct comprehensive scans using trusted security tools to identify and remove remnants of malware.
  • Access Controls: Implement strict access policies, limiting permissions to essential personnel only.
  • Incident Response Plan: Activate or develop a response plan for rapid containment and recovery.
  • Vendor Support: Consult SonicWall support for guidance and assistance tailored to the specific malware threat.
  • User Awareness: Educate staff on recognizing and preventing security threats related to malware.

Explore More Security Insights

Stay informed on the latest Threat Intelligence and Cyberattacks.

Learn more about global cybersecurity standards through the NIST Cybersecurity Framework.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1

CISO Update Cybersecurity MX1
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleShadowV2 Botnet Infects Docker on AWS to Launch Massive DDoS Attacks
Next Article Are MSPs and MSSPs Ready to Lead with Data-First DSPM-as-a-Service?
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

New JanaWare Ransomware Targets Turkish Users via Customized Adwind RAT

April 20, 2026

Iranian MOIS Orchestrates Coordinated Cyber Campaigns Using Multiple Hacker Personas

April 20, 2026

RCE Exploit via Malicious GGUF Files in SGLang CVE-2026-5760

April 20, 2026

Comments are closed.

Latest Posts

New JanaWare Ransomware Targets Turkish Users via Customized Adwind RAT

April 20, 2026

Iranian MOIS Orchestrates Coordinated Cyber Campaigns Using Multiple Hacker Personas

April 20, 2026

AI App Builder Data Breach: Thousands of Projects Exposed via API Flaw

April 20, 2026

Transforming QEMU into a Stealth Backdoor for Credential Theft & Ransomware

April 20, 2026
Don't Miss

New JanaWare Ransomware Targets Turkish Users via Customized Adwind RAT

By Staff WriterApril 20, 2026

Essential Insights JanaWare is a targeted ransomware campaign in Turkey, delivered via a heavily modified…

Iranian MOIS Orchestrates Coordinated Cyber Campaigns Using Multiple Hacker Personas

April 20, 2026

RCE Exploit via Malicious GGUF Files in SGLang CVE-2026-5760

April 20, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Cyberattack Disrupts Ambulance Response at Signature Healthcare
  • Vercel Employee AI Tool Access Triggers Data Breach
  • New JanaWare Ransomware Targets Turkish Users via Customized Adwind RAT
  • Iranian MOIS Orchestrates Coordinated Cyber Campaigns Using Multiple Hacker Personas
  • RCE Exploit via Malicious GGUF Files in SGLang CVE-2026-5760
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Cyberattack Disrupts Ambulance Response at Signature Healthcare

April 20, 2026

Vercel Employee AI Tool Access Triggers Data Breach

April 20, 2026

New JanaWare Ransomware Targets Turkish Users via Customized Adwind RAT

April 20, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202630 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Scams: Unstoppable but Manageable

June 3, 202523 Views

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Most Read
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.