Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

SonicWall has been working with Mandiant and other trusted third parties to identify the nature of the threat, which uses stolen credentials to install ransomware on affected devices. This new ransomware threat is described as “imminent,” meaning that you absolutely need to take this seriously. If you don’t, you run the risk of ransomware threats ravaging your technology. Communication has been sent out from SonicWall to affected customers.

Thankfully, the vulnerability that allowed these attacks to occur has been patched in more recent versions of the firmware, although SonicWall does state in its notice, “SonicWall PSIRT strongly suggests that organizations still using 8.x firmware review the information below and take immediate action.” The “information below,” in this case, details which devices are affected, how they are affected, and what must be done to resolve these vulnerabilities. In most cases regarding devices that have reached their end of life, the company recommends taking affected devices offline and resetting all associated credentials, but in the case of devices which are still supported, updating to the most recent firmware should also do the trick. SonicWall also urges users to change passwords and enable multi-factor authentication.

SonicWall apparently understands that it is not always easy to upgrade away from legacy technology. In response to this threat, they issued the following statement: To provide a transition path for customers with end-of-life devices that cannot upgrade to 9.x or 10.x firmware, we’re providing a complimentary virtual SMA 500v until October 31, 2021. This should provide sufficient time to transition to a product that is actively maintained.” It must be mentioned that this is only a short-term solution, not a long-term one.

These types of threats that strike out at software and unsupported firmware which has reached its end of life are not uncommon. All good things must come to an end eventually, including your technology solutions. It is your responsibility to make sure that your organization is only using technology that is currently supported by its developers. Failing to do so is asking for trouble, and you are only shooting yourself in the foot by ignoring them in favor of using older technology.

**Keep in mind, if we’re managing your IT and cybersecurity infrastructure, we’re handling all of your security updates. If you aren’t sure, reach out to us to ensure your agreement covers this type of support.**

Voyage Technology can help you address issues with your IT infrastructure where you might still be using older unsupported technologies. We can address any shortcomings with your network and handle the process of upgrading to better, more secure technology. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Hosted Solutions Users Collaboration Mobile Device Ransomware Quick Tips Workplace Strategy Cybersecurity Small Business Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money Android Business Management Smartphones VoIP Upgrade communications Managed Service Mobile Devices Disaster Recovery Browser Data Recovery Managed IT Services Social Media Microsoft Office Windows Network Remote Tech Term Internet of Things Current Events Facebook Automation Artificial Intelligence Productivity Cloud Computing Covid-19 Gadgets Managed Service Provider AI Remote Work Miscellaneous Server Information Holiday Outsourced IT Encryption Employee/Employer Relationship Spam Windows 10 Office Compliance Government Data Management Training Business Continuity Blockchain Windows 10 Wi-Fi Virtualization Business Technology Bandwidth Data Security Mobile Office Two-factor Authentication Apps App Mobile Device Management BYOD Vendor Gmail Chrome Employer-Employee Relationship Managed Services Voice over Internet Protocol Budget Apple Networking BDR Marketing Computing Applications Information Technology WiFi Access Control Office 365 IT Support Tip of the week Conferencing Hacker How To Avoiding Downtime Website Operating System HIPAA Router Risk Management Virtual Private Network Big Data Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Computers Bring Your Own Device Managed IT Services Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Firewall Vendor Management Solutions Cybercrime Physical Security Display Printer The Internet of Things Paperless Office Windows 11 Infrastructure 2FA Monitoring Social Excel Document Management Remote Workers Customer Service Telephone Scam Data loss Cooperation Free Resource Project Management Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Word Settings Wireless Printing Content Filtering IT Management YouTube Meetings VPN Employees Integration Safety Cryptocurrency Modem User Tip Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Data Storage Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Customer Relationship Management Managed IT Service Maintenance Downloads Antivirus Hacking Sports Presentation iPhone Mouse Licensing Wireless Technology Administration Vulnerabilities Entertainment Data Privacy IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Legal Data Analysis Business Growth Gamification Flexibility Recovery Notifications Staff Value Business Intelligence Legislation Shortcuts Organization Hard Drives Travel Social Networking Techology Fileless Malware Digital Security Cameras Domains Google Maps Smart Devices Cortana Ransmoware Alt Codes Content Remote Working Wearable Technology Memory Vendors Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Health IT Refrigeration Unified Threat Management Directions Videos Public Speaking Hosted Solution Assessment Electronic Health Records Permissions Workforce Lithium-ion battery Typing Wasting Time Threats Trend Micro Entrepreneur Network Congestion Specifications Security Cameras Workplace Strategies Google Drive User Error Microchip Internet Exlporer Software as a Service Knowledge Fraud Meta Username Managing Costs Amazon Point of Sale eCommerce 5G Black Friday SSID Undo Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Outsource IT Media Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Cookies Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Windows 8 Application Laptop Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Drones Shopping SharePoint IBM Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Halloween Chatbots Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Identity Theft Smart Tech Memes Fun Co-managed IT Superfish Bookmark Competition Deep Learning Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Financial Data Error History Education Connectivity IT Social Engineering Break Fix Scams Browsers Smartwatch Upload Procurement User Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Mobile Computing Social Network Telework Cyber security Tablet IoT Communitications Search Dark Web Cables CES IP Address Best Practice Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Buisness File Sharing Regulations

Blog Archive