Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

SonicWall has been working with Mandiant and other trusted third parties to identify the nature of the threat, which uses stolen credentials to install ransomware on affected devices. This new ransomware threat is described as “imminent,” meaning that you absolutely need to take this seriously. If you don’t, you run the risk of ransomware threats ravaging your technology. Communication has been sent out from SonicWall to affected customers.

Thankfully, the vulnerability that allowed these attacks to occur has been patched in more recent versions of the firmware, although SonicWall does state in its notice, “SonicWall PSIRT strongly suggests that organizations still using 8.x firmware review the information below and take immediate action.” The “information below,” in this case, details which devices are affected, how they are affected, and what must be done to resolve these vulnerabilities. In most cases regarding devices that have reached their end of life, the company recommends taking affected devices offline and resetting all associated credentials, but in the case of devices which are still supported, updating to the most recent firmware should also do the trick. SonicWall also urges users to change passwords and enable multi-factor authentication.

SonicWall apparently understands that it is not always easy to upgrade away from legacy technology. In response to this threat, they issued the following statement: To provide a transition path for customers with end-of-life devices that cannot upgrade to 9.x or 10.x firmware, we’re providing a complimentary virtual SMA 500v until October 31, 2021. This should provide sufficient time to transition to a product that is actively maintained.” It must be mentioned that this is only a short-term solution, not a long-term one.

These types of threats that strike out at software and unsupported firmware which has reached its end of life are not uncommon. All good things must come to an end eventually, including your technology solutions. It is your responsibility to make sure that your organization is only using technology that is currently supported by its developers. Failing to do so is asking for trouble, and you are only shooting yourself in the foot by ignoring them in favor of using older technology.

**Keep in mind, if we’re managing your IT and cybersecurity infrastructure, we’re handling all of your security updates. If you aren’t sure, reach out to us to ensure your agreement covers this type of support.**

Voyage Technology can help you address issues with your IT infrastructure where you might still be using older unsupported technologies. We can address any shortcomings with your network and handle the process of upgrading to better, more secure technology. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 December 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet IT Support Efficiency User Tips Malware Email Privacy Phishing Google Workplace Tips Computer IT Services Users Collaboration Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Small Business Microsoft Workplace Strategy Data Backup Communication Smartphone Business Management VoIP Smartphones Android Saving Money Mobile Devices communications Passwords Data Recovery Backup Managed Service Managed IT Services Browser Social Media Microsoft Office Upgrade Disaster Recovery Network Tech Term Internet of Things Remote Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Miscellaneous Gadgets Server Managed Service Provider Windows Remote Work Information Current Events Productivity Outsourced IT Encryption Spam Employee/Employer Relationship Holiday Windows 10 AI Government Office Compliance Data Management Business Continuity Virtualization Training Business Technology Wi-Fi Windows 10 Blockchain Apps Two-factor Authentication Mobile Office Data Security Bandwidth Apple Vendor App Employer-Employee Relationship Managed Services Voice over Internet Protocol Mobile Device Management Networking Chrome Gmail Budget WiFi BYOD Applications Access Control Computing Hacker Tip of the week Information Technology Avoiding Downtime Conferencing Office 365 How To BDR Bring Your Own Device HIPAA Big Data Router Virtual Private Network Health Healthcare Operating System Help Desk Computers Risk Management Retail Website Marketing Analytics Office Tips Managed IT Services Augmented Reality Storage Password Windows 11 The Internet of Things Remote Monitoring Vulnerability End of Support Vendor Management 2FA Social Excel Display Printer Going Green Remote Workers Paperless Office Infrastructure Customer Service Monitoring Cybercrime Document Management Free Resource Project Management Windows 7 Microsoft 365 Telephone Scam Data loss Solutions IT Support Firewall Cooperation Patch Management Save Money Mouse Holidays Data Storage Supply Chain IT Management Administration VPN Video Conferencing Meetings Managed Services Provider Physical Security Professional Services Virtual Machines User Tip Modem Processor Computer Repair Mobile Security Customer Relationship Management Settings Printing Wireless Content Filtering iPhone Smart Technology Hacking Presentation YouTube Machine Learning Vulnerabilities Saving Time Cryptocurrency Data Privacy Wireless Technology Images 101 Managed IT Service Mobility Maintenance Virtual Desktop Multi-Factor Authentication LiFi Downloads Data storage Antivirus Word Licensing Outlook Entertainment Money Employees Integration Humor Telephone System Safety Robot Cost Management Sports Wearable Technology Medical IT Reviews Content Education Health IT Development Unified Threat Management Motherboard Transportation Small Businesses Comparison Unified Threat Management Directions Mobile Computing Assessment Hypervisor Displays Permissions Search PowerPoint Shopping Optimization Best Practice Employer/Employee Relationships Outsourcing Network Congestion Specifications Application User Error Microchip PCI DSS Internet Exlporer Buisness Fraud Navigation Workplace IBM Legal Gig Economy Username IT solutions Business Growth Internet Service Provider Point of Sale Teamwork Hiring/Firing Black Friday Regulations Compliance Database Evernote Paperless Tech Support IT Technicians Cortana Co-managed IT Network Management Memes Proxy Server Alt Codes Net Neutrality Cookies SQL Server Technology Care Monitors Cyber Monday Competition Financial Data Tactics Downtime History Hotspot Business Communications IT Websites Mirgation Scams Smartwatch Hosted Solution Typing Procurement Nanotechnology Azure Hybrid Work Tech Human Resources SharePoint Telework Addiction Cyber security Electronic Medical Records Language Communitications Chatbots Knowledge Cables User Google Drive CES Management Lenovo Supply Chain Management Screen Reader Writing Distributed Denial of Service Term Google Apps FinTech Service Level Agreement Virtual Reality Computing Infrastructure 5G IT Assessment Private Cloud Identity Experience IT Maintenance IP Address Google Docs Server Management Unified Communications Superfish Bookmark Bitcoin Flexibility Identity Theft Smart Tech Running Cable Value Business Intelligence Shortcuts Google Wallet Organization Download Twitter Alerts Smart Devices Error Ransmoware Recovery Digital Security Cameras Browsers Windows 8 Remote Working Connectivity Laptop Memory Vendors Social Engineering Break Fix Hard Drives Google Play Be Proactive Domains Drones Upload Data Breach Remote Computing Electronic Health Records Workforce Multi-Factor Security Videos Social Network Tablet IoT Halloween Wasting Time Threats Dark Web Refrigeration Security Cameras Workplace Strategies Public Speaking Trends Trend Micro Alert Managed IT Customer Resource management Software as a Service File Sharing Regulations Meta Lithium-ion battery Dark Data Google Calendar Entrepreneur Data Analysis Hacks Star Wars Scary Stories Managing Costs Amazon How To Microsoft Excel Notifications Staff Fun SSID Gamification eCommerce Deep Learning Surveillance Travel Social Networking Virtual Assistant Outsource IT Legislation Techology Fileless Malware Google Maps Virtual Machine Environment Media Undo

Blog Archive