UNC6148 Targets Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit
On July 16, 2025, cybersecurity analysts from the Google Threat Intelligence Group (GTIG) disclosed a troubling trend involving UNC6148, a hacking group targeting fully-patched SonicWall Secure Mobile Access (SMA) 100 Series appliances. The campaign, which began around October 2024, aims to implant a backdoor known as OVERSTEP into these end-of-life systems. This significant vulnerability raises red flags for organizations reliant on these devices for secure access.
The primary victims in this campaign are users of the SonicWall SMA 100 series—technologies that, despite being updated to the latest patches, have proven susceptible to exploitation. The extent of known victims currently appears limited, but the implications are severe, especially as the threat actors have proven adept at retaining access to systems, circumventing security measures put in place by organizations. The GTIG assessed with high confidence that UNC6148 is using stolen credentials and one-time password (OTP) seeds gleaned from prior intrusions to regain access, even after patches have been applied.
Data analysis suggests that UNC6148 may have first exfiltrated these credentials from the SMA appliances as early as January 2025. Notably, the precise method employed to execute this initial compromise remains unidentified, highlighting a significant gap in the understanding of the attack vector. The lack of clarity underscores an urgent need for vigilance among businesses utilizing these devices.
From a cybersecurity perspective, this incident illustrates the challenges posed by persistent threat actors who exploit vulnerabilities within seemingly secure systems. The MITRE ATT&CK framework reveals several tactics and techniques likely employed by UNC6148, including initial access, achieving persistence, and possibly privilege escalation. These tactics indicate a well-coordinated strategy to infiltrate, maintain, and expand their foothold on compromised networks.
Organizations that continue to utilize the SonicWall SMA 100 series should be particularly cautious. The risk extends beyond just the technical ramifications; it reflects broader issues of reliance on legacy systems in an evolving threat landscape. As threat actors enhance their capabilities to exploit even patched devices, the importance of continuous monitoring and proactive security measures cannot be overstated.
In conclusion, the ongoing activities of UNC6148 serve as a wake-up call for the cybersecurity community and businesses alike. As sophisticated methods emerge, remaining informed, adjusting strategies, and rigorously applying security updates will be paramount in defending against such targeted attacks. The implications of this breach will likely resonate for a considerable time, urging businesses to assess their vulnerabilities and reinforce their cybersecurity postures.