fbpx
Mytek Logo
MyTek Logo

Cybersecurity Tools Now Delivering Ransomware

by | Aug 30, 2021 | MyTek Blog, Security

Q

Subscribe To The Blog

By subscribing to the blog, you will be notified when a new blog post is created on the site.

Another new ransomware threat is making its rounds and targeting unpatched and end-of-life SonicWall’s Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. This threat is being used right now, so if any businesses use these devices, they should be taking action right away. Let’s talk about what to do against the SMA and SRA ransomware. 

Mandiant, SonicWall, and other trusted third parties have worked to figure out the nature of this threat. They’ve found that it uses stolen credentials to install ransomware on devices that are vulnerable and have been described as imminent. This means that without immediate action, these threats could become extremely problematic for your business and its technology. SonicWall has been in contact with its customers who were affected in order to inform them about the situation.

Don’t panic, though, there is some good news. The vulnerability that is allowing threats in is a part of the older version of the firmware. If you are using a more recent version of it, this issue will already be patched for you. This is what SonicWall said about this: “SonicWall PSIRT strongly suggests that organizations still using 8.x firmware review the information below and take immediate action.” SonicWall has also detailed the devices that are affected, how they are affected, and what they recommend you do about these issues. If your device has reached its end of life, SonicWall suggests that you take it offline and reset its credentials. If your device is still supported, you should update your firmware immediately to fix the vulnerability. You should also change your user passwords and enable multi-factor authentication.

SonicWall understands the issues that make arise when you upgrade to more recent hardware, so they have issued a statement to their customers about this. “To provide a transition path for customers with end-of-life devices that cannot upgrade to 9.x or 10.x firmware, we’re providing a complimentary virtual SMA 500v until October 31, 2021. This should provide sufficient time to transition to a product that is actively maintained.” While this is a short-term fix, the long-term fix is to upgrade your hardware.

Threats that target unupgraded firmware and software are not uncommon. It is always important that you do not let your devices reach their end of life. MyTek is here to help you with this and can be there to make sure that your technology is always updated and can’t be affected by threats like the SMA and SRA ransomware. Give us a call today at 623-312-2444.

ABOUT THE AUTHOR

Tim - Team

Tim Tiller, LMSW

 
Tim Tiller, MSW brings a deep service background to his role at Mytek, having graduated from McDonald’s management training program, fresh out of high school, and working his way up through the ranks in the hospitality industry. He has led two prior companies – Multi-Systems Inc., an IT-focused organization providing technology to hospitality companies (where he was named President at age 36), and most recently, as Chief Operating Officer for Jewish Voice Ministries International.

Q

Subscribe To This Author

By subscribing to the author, you will be notified when a new blog post is created by the author.

AUTHOR’S RECENT POSTS

Top 5 Hardware Monitoring Software 

Did you know that almost 40% of servers had at least one outage in the last twelve months? Veeam reports that the most common reason for outrages is infrastructure failure which puts the current hardware monitoring practices under the scanner. Hardware failures are...

Types of Mobile Malware & How to Defend Against Them

Malware has a long history of undermining computer security and stealing critical data. With the rapid growth of mobile usage, we're now seeing a new breed of mobile malware infecting smartphones and tablets. The new-age mobile malware are more advanced, seamless, and...

How to Protect Your Data Privacy & Enhance IT Security

Every time you use a device, you enter, modify or access data. Some of your usages are routine and public but sometimes you perform tasks that are confidential in your personal life or business. Naturally, this type of data is private and it should be kept that way....

Mobile? Grab this Article!

QR Code

Blog Archive

Share This