Title: UNC6148 Exploits Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit

Date: July 16, 2025
Category: Vulnerability / Cyber Espionage

A threat actor group, identified as UNC6148, has been found targeting fully-patched SonicWall Secure Mobile Access (SMA) 100 series appliances, as part of an operation to deploy a backdoor known as OVERSTEP. This malicious activity has been traced back to at least October 2024. The Google Threat Intelligence Group (GTIG) reports that the number of known victims is currently “limited.” The tech giant has high confidence in its assessment that the group is utilizing credentials and one-time password (OTP) seeds stolen from previous breaches, enabling them to regain access even after organizations have implemented security updates. Metadata analysis indicates that UNC6148 may have first exfiltrated these credentials from the SMA appliance as early as January 2025. The precise method of initial access for delivering the malware remains unknown due to the evasive actions taken by the threat actor.

UNC6148 Targets Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit

On July 16, 2025, cybersecurity analysts from the Google Threat Intelligence Group (GTIG) disclosed a troubling trend involving UNC6148, a hacking group targeting fully-patched SonicWall Secure Mobile Access (SMA) 100 Series appliances. The campaign, which began around October 2024, aims to implant a backdoor known as OVERSTEP into these end-of-life systems. This significant vulnerability raises red flags for organizations reliant on these devices for secure access.

The primary victims in this campaign are users of the SonicWall SMA 100 series—technologies that, despite being updated to the latest patches, have proven susceptible to exploitation. The extent of known victims currently appears limited, but the implications are severe, especially as the threat actors have proven adept at retaining access to systems, circumventing security measures put in place by organizations. The GTIG assessed with high confidence that UNC6148 is using stolen credentials and one-time password (OTP) seeds gleaned from prior intrusions to regain access, even after patches have been applied.

Data analysis suggests that UNC6148 may have first exfiltrated these credentials from the SMA appliances as early as January 2025. Notably, the precise method employed to execute this initial compromise remains unidentified, highlighting a significant gap in the understanding of the attack vector. The lack of clarity underscores an urgent need for vigilance among businesses utilizing these devices.

From a cybersecurity perspective, this incident illustrates the challenges posed by persistent threat actors who exploit vulnerabilities within seemingly secure systems. The MITRE ATT&CK framework reveals several tactics and techniques likely employed by UNC6148, including initial access, achieving persistence, and possibly privilege escalation. These tactics indicate a well-coordinated strategy to infiltrate, maintain, and expand their foothold on compromised networks.

Organizations that continue to utilize the SonicWall SMA 100 series should be particularly cautious. The risk extends beyond just the technical ramifications; it reflects broader issues of reliance on legacy systems in an evolving threat landscape. As threat actors enhance their capabilities to exploit even patched devices, the importance of continuous monitoring and proactive security measures cannot be overstated.

In conclusion, the ongoing activities of UNC6148 serve as a wake-up call for the cybersecurity community and businesses alike. As sophisticated methods emerge, remaining informed, adjusting strategies, and rigorously applying security updates will be paramount in defending against such targeted attacks. The implications of this breach will likely resonate for a considerable time, urging businesses to assess their vulnerabilities and reinforce their cybersecurity postures.

Source link