Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

SonicWall has been working with Mandiant and other trusted third parties to identify the nature of the threat, which uses stolen credentials to install ransomware on affected devices. This new ransomware threat is described as “imminent,” meaning that you absolutely need to take this seriously. If you don’t, you run the risk of ransomware threats ravaging your technology. Communication has been sent out from SonicWall to affected customers.

Thankfully, the vulnerability that allowed these attacks to occur has been patched in more recent versions of the firmware, although SonicWall does state in its notice, “SonicWall PSIRT strongly suggests that organizations still using 8.x firmware review the information below and take immediate action.” The “information below,” in this case, details which devices are affected, how they are affected, and what must be done to resolve these vulnerabilities. In most cases regarding devices that have reached their end of life, the company recommends taking affected devices offline and resetting all associated credentials, but in the case of devices which are still supported, updating to the most recent firmware should also do the trick. SonicWall also urges users to change passwords and enable multi-factor authentication.

SonicWall apparently understands that it is not always easy to upgrade away from legacy technology. In response to this threat, they issued the following statement: To provide a transition path for customers with end-of-life devices that cannot upgrade to 9.x or 10.x firmware, we’re providing a complimentary virtual SMA 500v until October 31, 2021. This should provide sufficient time to transition to a product that is actively maintained.” It must be mentioned that this is only a short-term solution, not a long-term one.

These types of threats that strike out at software and unsupported firmware which has reached its end of life are not uncommon. All good things must come to an end eventually, including your technology solutions. It is your responsibility to make sure that your organization is only using technology that is currently supported by its developers. Failing to do so is asking for trouble, and you are only shooting yourself in the foot by ignoring them in favor of using older technology.

**Keep in mind, if we’re managing your IT and cybersecurity infrastructure, we’re handling all of your security updates. If you aren’t sure, reach out to us to ensure your agreement covers this type of support.**

Voyage Technology can help you address issues with your IT infrastructure where you might still be using older unsupported technologies. We can address any shortcomings with your network and handle the process of upgrading to better, more secure technology. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 09 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Communication Cybersecurity Saving Money Smartphone Managed Service Data Backup Android Upgrade VoIP Business Management Smartphones Data Recovery AI Mobile Devices communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Automation Facebook Miscellaneous Information Artificial Intelligence Gadgets Cloud Computing Covid-19 Holiday Training Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Spam IT Support Employee/Employer Relationship Windows 10 Office Government Business Continuity Data Management Business Technology Virtualization Wi-Fi Blockchain Bandwidth Windows 10 Apps Data Security Two-factor Authentication Mobile Office Vendor Apple Tip of the week App Managed Services Voice over Internet Protocol Employer-Employee Relationship Networking BYOD Chrome Mobile Device Management Budget Gmail WiFi Conferencing Computing How To Information Technology BDR Hacker Avoiding Downtime Office 365 HIPAA Marketing Applications Access Control 2FA Help Desk Big Data Retail Healthcare Operating System Managed IT Services Risk Management Computers Analytics Website Office Tips Augmented Reality Router Virtual Private Network Storage Password Health Bring Your Own Device Monitoring The Internet of Things Excel Document Management Social Going Green Remote Workers Telephone Scam Cybercrime Data loss Cooperation Free Resource Customer Service Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Physical Security Display Firewall Printer Paperless Office Windows 11 Infrastructure Data Storage Safety Smart Technology Supply Chain Administration Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Managed IT Service Settings Maintenance Antivirus Printing Downloads Wireless Content Filtering iPhone Licensing Customer Relationship Management YouTube Entertainment Vulnerabilities Data Privacy Cryptocurrency Hacking Presentation Images 101 Telephone System Multi-Factor Authentication Robot Mobility Virtual Desktop LiFi Wireless Technology Cost Management Data storage Outlook IT Management VPN Employees Meetings Money Word Humor Integration User Tip Modem Processor Computer Repair Mobile Security Sports Holidays Mouse Websites Mirgation Hypervisor Displays Mobile Computing Undo Search Shopping Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing Best Practice SharePoint Addiction Management PCI DSS Chatbots Navigation Buisness Lenovo Gig Economy Screen Reader Legal Writing Distributed Denial of Service Workplace IT solutions Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Business Growth Service Level Agreement Internet Service Provider Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Application Cortana Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Twitter Alerts SQL Server Technology Care Alt Codes IBM Download Net Neutrality Financial Data Error History Business Communications Downtime Hosted Solution Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Typing Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Competition Knowledge CES Tablet IoT Communitications Google Drive Dark Web Cables Alert Trends Supply Chain Management 5G Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Unified Communications Experience Data Analysis Star Wars IT Assessment Google Docs How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Bitcoin Running Cable User Gamification Flexibility Organization Travel Social Networking Google Wallet Legislation Shortcuts Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Wearable Technology Memory Vendors Windows 8 IP Address Laptop Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Drones Comparison Google Play Be Proactive Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Halloween Recovery Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Hard Drives Domains User Error Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Hacks Scary Stories Username Fun Point of Sale eCommerce Black Friday SSID Refrigeration Deep Learning Public Speaking Database Surveillance Virtual Assistant Outsource IT Network Management Tech Support IT Technicians Virtual Machine Environment Lithium-ion battery Media Entrepreneur Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Education Hotspot Transportation Small Businesses Tactics Development

Blog Archive