Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

SonicWall has been working with Mandiant and other trusted third parties to identify the nature of the threat, which uses stolen credentials to install ransomware on affected devices. This new ransomware threat is described as “imminent,” meaning that you absolutely need to take this seriously. If you don’t, you run the risk of ransomware threats ravaging your technology. Communication has been sent out from SonicWall to affected customers.

Thankfully, the vulnerability that allowed these attacks to occur has been patched in more recent versions of the firmware, although SonicWall does state in its notice, “SonicWall PSIRT strongly suggests that organizations still using 8.x firmware review the information below and take immediate action.” The “information below,” in this case, details which devices are affected, how they are affected, and what must be done to resolve these vulnerabilities. In most cases regarding devices that have reached their end of life, the company recommends taking affected devices offline and resetting all associated credentials, but in the case of devices which are still supported, updating to the most recent firmware should also do the trick. SonicWall also urges users to change passwords and enable multi-factor authentication.

SonicWall apparently understands that it is not always easy to upgrade away from legacy technology. In response to this threat, they issued the following statement: To provide a transition path for customers with end-of-life devices that cannot upgrade to 9.x or 10.x firmware, we’re providing a complimentary virtual SMA 500v until October 31, 2021. This should provide sufficient time to transition to a product that is actively maintained.” It must be mentioned that this is only a short-term solution, not a long-term one.

These types of threats that strike out at software and unsupported firmware which has reached its end of life are not uncommon. All good things must come to an end eventually, including your technology solutions. It is your responsibility to make sure that your organization is only using technology that is currently supported by its developers. Failing to do so is asking for trouble, and you are only shooting yourself in the foot by ignoring them in favor of using older technology.

**Keep in mind, if we’re managing your IT and cybersecurity infrastructure, we’re handling all of your security updates. If you aren’t sure, reach out to us to ensure your agreement covers this type of support.**

Voyage Technology can help you address issues with your IT infrastructure where you might still be using older unsupported technologies. We can address any shortcomings with your network and handle the process of upgrading to better, more secure technology. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 27 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Computer Email Workplace Tips Phishing IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Workplace Strategy Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android VoIP Business Management Smartphones Upgrade Mobile Devices communications Disaster Recovery Data Recovery Productivity Windows Browser Social Media Microsoft Office Managed IT Services AI Current Events Tech Term Remote Network Internet of Things Automation Artificial Intelligence Facebook Covid-19 Gadgets Cloud Computing Holiday Training Server Managed Service Provider Remote Work Miscellaneous Information Outsourced IT Compliance Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Business Technology IT Support Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Chrome Mobile Device Management Budget Gmail Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Hacker Access Control Avoiding Downtime Office 365 Marketing Tip of the week Conferencing How To WiFi BDR HIPAA Computing Applications Information Technology Computers Healthcare Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data 2FA Operating System Router Virtual Private Network Risk Management Printer Paperless Office Infrastructure Monitoring Free Resource Project Management Document Management Windows 7 Microsoft 365 Firewall Telephone Scam Solutions Data loss The Internet of Things Cooperation Going Green Patch Management Windows 11 Social Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Excel Physical Security Customer Service Display Remote Workers Processor Presentation Computer Repair Mobile Security Virtual Desktop iPhone Data storage LiFi Wireless Technology Vulnerabilities Smart Technology Outlook Data Privacy Machine Learning Money Saving Time Images 101 Humor Word Mobility Multi-Factor Authentication Managed IT Service Maintenance Sports Downloads Antivirus Mouse Licensing Safety Employees Entertainment Administration Integration Telephone System Holidays Robot Cost Management Settings Data Storage Printing Supply Chain Wireless Video Conferencing Content Filtering IT Management Managed Services Provider Customer Relationship Management VPN Virtual Machines YouTube Meetings Professional Services Cryptocurrency User Tip Modem Hacking Google Docs Net Neutrality Unified Communications Database SQL Server Technology Care Experience Running Cable Tech Support IT Technicians Business Communications User Financial Data Bitcoin Network Management History Google Wallet Proxy Server IT Cookies Scams Monitors Cyber Monday Smartwatch Procurement Tactics Azure Hybrid Work Hotspot Laptop Websites Mirgation Tech Human Resources Telework Windows 8 Cyber security IP Address Drones Communitications Nanotechnology Cables CES SharePoint Supply Chain Management Addiction Electronic Medical Records Language Halloween Chatbots Term Google Apps Recovery FinTech Management Lenovo IT Assessment Screen Reader IT Maintenance Hard Drives Writing Distributed Denial of Service Flexibility Service Level Agreement Value Business Intelligence Domains Virtual Reality Computing Infrastructure Scary Stories Private Cloud Identity Shortcuts Organization Hacks Server Management Digital Security Cameras Superfish Bookmark Smart Devices Identity Theft Smart Tech Ransmoware Refrigeration Fun Remote Working Deep Learning Download Memory Vendors Public Speaking Twitter Alerts Data Breach Lithium-ion battery Error Google Play Be Proactive Videos Browsers Electronic Health Records Education Connectivity Workforce Social Engineering Break Fix Entrepreneur Upload Wasting Time Threats Remote Computing Trend Micro Security Cameras Workplace Strategies Multi-Factor Security Mobile Computing Social Network Software as a Service Tablet IoT Meta Undo Search Dark Web Best Practice Trends Managing Costs Amazon Alert Managed IT Customer Resource management eCommerce Buisness File Sharing Regulations SSID Dark Data Google Calendar Legal Data Analysis Surveillance IT solutions Star Wars Virtual Assistant Outsource IT How To Microsoft Excel Notifications Staff Media Business Growth Gamification Virtual Machine Environment Travel Social Networking Medical IT Application Legislation Reviews Techology Fileless Malware Development Google Maps Transportation Small Businesses Cortana Wearable Technology Alt Codes Content Hypervisor Displays IBM Health IT Optimization Downtime Unified Threat Management Motherboard PowerPoint Comparison Shopping Unified Threat Management Directions Hosted Solution Assessment Employer/Employee Relationships Outsourcing Permissions Navigation PCI DSS Typing Workplace Network Congestion Specifications Gig Economy Google Drive User Error Microchip Internet Service Provider Internet Exlporer Teamwork Hiring/Firing Competition Knowledge Fraud Evernote Paperless Regulations Compliance Username Memes Point of Sale Co-managed IT 5G Black Friday

Blog Archive