WordPress database error: [Table 'u972488317_RwlKP.ZtiwWuIba_patchstack_firewall_log' doesn't exist]
SELECT COUNT(*) as blockedCount FROM ZtiwWuIba_patchstack_firewall_log WHERE block_type = 'BLOCK' AND apply_ban = 1 AND ip = '216.73.216.81' AND log_date >= ('2025-07-19 08:50:56' - INTERVAL 2 MINUTE)

Ransomware actors target patched SonicWall SMA devices with rootkit | #ransomware | #cybercrime - National Cyber Security Consulting

Ransomware actors target patched SonicWall SMA devices with rootkit | #ransomware | #cybercrime


The OVERSTEP backdoor, written in C, is specifically designed for SonicWall SMA 100 series appliances. It injects itself into the memory of other processes via the /etc/ld.so.preload file and then hijacks standard file system functions such as open, open64, readdir, readdir64, and write. This allows it to hide its components on the system.

The backdoor’s main purpose is to steal passwords and provide attackers with a reverse shell on the system, through which they can execute additional shell commands.

“In our investigations, GTIG observed beaconing traffic from compromised appliances, but we did not identify notable post-compromise activities,” the researchers wrote. “The actor’s success in hiding their tracks is largely due to OVERSTEP’s capability to selectively delete log entries from httpd.log, http_request.log, and inotify.log. This anti-forensic measure, combined with a lack of shell history on disk, significantly reduces visibility into the actor’s secondary objectives.”



Source link

.........................

National Cyber Security

FREE
VIEW