Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

SonicWall has been working with Mandiant and other trusted third parties to identify the nature of the threat, which uses stolen credentials to install ransomware on affected devices. This new ransomware threat is described as “imminent,” meaning that you absolutely need to take this seriously. If you don’t, you run the risk of ransomware threats ravaging your technology. Communication has been sent out from SonicWall to affected customers.

Thankfully, the vulnerability that allowed these attacks to occur has been patched in more recent versions of the firmware, although SonicWall does state in its notice, “SonicWall PSIRT strongly suggests that organizations still using 8.x firmware review the information below and take immediate action.” The “information below,” in this case, details which devices are affected, how they are affected, and what must be done to resolve these vulnerabilities. In most cases regarding devices that have reached their end of life, the company recommends taking affected devices offline and resetting all associated credentials, but in the case of devices which are still supported, updating to the most recent firmware should also do the trick. SonicWall also urges users to change passwords and enable multi-factor authentication.

SonicWall apparently understands that it is not always easy to upgrade away from legacy technology. In response to this threat, they issued the following statement: To provide a transition path for customers with end-of-life devices that cannot upgrade to 9.x or 10.x firmware, we’re providing a complimentary virtual SMA 500v until October 31, 2021. This should provide sufficient time to transition to a product that is actively maintained.” It must be mentioned that this is only a short-term solution, not a long-term one.

These types of threats that strike out at software and unsupported firmware which has reached its end of life are not uncommon. All good things must come to an end eventually, including your technology solutions. It is your responsibility to make sure that your organization is only using technology that is currently supported by its developers. Failing to do so is asking for trouble, and you are only shooting yourself in the foot by ignoring them in favor of using older technology.

**Keep in mind, if we’re managing your IT and cybersecurity infrastructure, we’re handling all of your security updates. If you aren’t sure, reach out to us to ensure your agreement covers this type of support.**

Voyage Technology can help you address issues with your IT infrastructure where you might still be using older unsupported technologies. We can address any shortcomings with your network and handle the process of upgrading to better, more secure technology. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 09 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade Smartphones AI Data Recovery VoIP Business Management Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Tech Term Network Internet of Things Remote Automation Artificial Intelligence Information Facebook Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT Spam IT Support Encryption Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Blockchain Windows 10 Virtualization Apps Two-factor Authentication Mobile Office Vendor Data Security Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking App Computing Information Technology Conferencing Hacker Access Control Avoiding Downtime Office 365 Marketing HIPAA How To WiFi Applications BDR Operating System 2FA Help Desk Risk Management Virtual Private Network Computers Healthcare Health Analytics Website Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Router Big Data Remote Monitoring Windows 11 End of Support Vulnerability Vendor Management Monitoring Cybercrime Excel Physical Security Customer Service Display Printer Remote Workers Paperless Office Telephone Infrastructure Cooperation Free Resource Document Management Project Management Windows 7 Firewall Microsoft 365 Scam Data loss Solutions The Internet of Things Social Going Green Patch Management Save Money Holidays Settings Wireless Printing Content Filtering Data Storage IT Management Customer Relationship Management Smart Technology Supply Chain YouTube Meetings Video Conferencing VPN Managed Services Provider Saving Time Virtual Machines Cryptocurrency Professional Services Hacking Presentation Computer Repair Managed IT Service Virtual Desktop Data storage LiFi Wireless Technology Downloads iPhone Licensing Outlook Entertainment Vulnerabilities Machine Learning Data Privacy Money Humor Word Images 101 Telephone System Multi-Factor Authentication Maintenance Mobility Cost Management Antivirus Sports Mouse Safety Administration Employees Integration User Tip Modem Robot Processor Mobile Security Proxy Server Reviews Cookies Alt Codes IBM Cyber Monday Medical IT Downtime Unified Threat Management Tactics Development Hotspot Transportation Small Businesses Unified Threat Management Mirgation Hypervisor Displays Hosted Solution Shopping Nanotechnology Optimization Typing PowerPoint Network Congestion Addiction Language Employer/Employee Relationships Outsourcing Management PCI DSS Google Drive User Error Chatbots Competition Navigation Knowledge Gig Economy Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Point of Sale 5G Service Level Agreement Internet Service Provider Regulations Compliance Google Docs Identity Unified Communications Evernote Paperless Experience Bookmark Smart Tech Memes Bitcoin Network Management Co-managed IT Running Cable Tech Support User Alerts SQL Server Technology Care Monitors Download Net Neutrality Google Wallet Financial Data History Business Communications Browsers Smartwatch Connectivity IT Windows 8 IP Address Break Fix Scams Laptop Websites Azure Hybrid Work Upload Procurement Drones Social Network Telework SharePoint Cyber security Multi-Factor Security Tech Human Resources Electronic Medical Records CES IoT Communitications Dark Web Cables Halloween Recovery Hard Drives Writing Trends Supply Chain Management Lenovo Customer Resource management FinTech Regulations Domains Google Calendar Term Google Apps Virtual Reality Data Analysis Star Wars IT Assessment Hacks Server Management Microsoft Excel IT Maintenance Scary Stories Private Cloud Staff Value Business Intelligence Identity Theft Refrigeration Fun Gamification Flexibility Superfish Organization Social Networking Deep Learning Public Speaking Legislation Shortcuts Twitter Fileless Malware Digital Security Cameras Smart Devices Lithium-ion battery Ransmoware Error Wearable Technology Memory Vendors Education Social Engineering Entrepreneur Content Remote Working Health IT Motherboard Data Breach Comparison Google Play Be Proactive Remote Computing Directions Videos Assessment Electronic Health Records Mobile Computing Permissions Workforce Wasting Time Threats Tablet Undo Search Trend Micro Best Practice Specifications Security Cameras Workplace Strategies Alert Dark Data Microchip Internet Exlporer Software as a Service Managed IT Fraud Meta Buisness File Sharing Managing Costs Amazon IT solutions How To Username Legal eCommerce Business Growth Black Friday SSID Notifications Application Database Surveillance Virtual Assistant Outsource IT Travel Techology IT Technicians Virtual Machine Environment Google Maps Media Cortana

Blog Archive