Google Alerts on OVERSTEP Backdoor Targeting SonicWall SMA Devices

Edward Zhou
Edward Zhou

CEO & Co-Founder

 
July 17, 2025 3 min read

Exploitation of SonicWall SMA 100 Appliances by UNC6148

Overview of Malicious Activity

The Google Threat Intelligence Group (GTIG) has identified a continuous campaign targeting fully patched end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances. The threat actor, referred to as UNC6148, exploits stolen credentials and one-time password (OTP) seeds to regain access to these devices even after security updates are applied. The campaign began at least as early as October 2024, with the actors leveraging known vulnerabilities, including CVE-2021-20035, CVE-2021-20038, CVE-2021-20039, CVE-2024-38475, and CVE-2025-32819.

SonicWall SMA 100 series appliances

Image courtesy of The Record from Recorded Future News

Deployment of OVERSTEP Backdoor

A novel aspect of the UNC6148 campaign is the deployment of a backdoor named OVERSTEP. This malware modifies the boot process of the SonicWall appliance, allowing for persistent access, credential theft, and concealment of its components. The malware is specifically designed for the SMA 100 series, which has reached end-of-life status. The GTIG suspects that UNC6148 may have utilized an unknown zero-day remote code execution vulnerability to execute OVERSTEP on targeted devices.

Mandiant's analysis shows that UNC6148 first established an SSL-VPN session using stolen local administrator credentials before spawning a reverse shell. This access is atypical for the appliance's design, suggesting the use of advanced techniques or unknown vulnerabilities.

Cyber Security Data Breach Protection

Image courtesy of Cybersecurity Dive

Attack Vector and Techniques

The initial entry point for UNC6148 remains unclear, but it is believed that they might have utilized known vulnerabilities to exploit the devices. The malware is designed to erase log entries, complicating forensic investigations and making it difficult to trace the origin of the breach.

According to reports, organizations receiving the attacks are advised to reset OTP bindings to mitigate unauthorized access. SonicWall has confirmed that they are actively investigating the incidents and providing updates to their customers.

Persistence and Evasion Techniques

OVERSTEP incorporates user-mode rootkit capabilities that allow it to hide its components and activities on the compromised appliances. It modifies essential system files and hooks API functions to prevent detection. For example, the malware hijacks the open and readdir functions to conceal its presence from directory listings.

The primary commands executed by OVERSTEP include:

  • dobackshell: Initiates a reverse shell connection to the attacker's server.
  • dopasswords: Archives sensitive files for exfiltration.

Recommended Actions for Organizations

Organizations using SonicWall SMA appliances should undertake immediate investigations to ascertain if they have been compromised. Key recommendations include:

  • Acquiring disk images for forensic analysis.
  • Resetting all credentials, including passwords and OTP bindings.
  • Engaging with SonicWall for guidance on mitigating the threat.

Researchers emphasize the importance of analyzing disk images for indicators of compromise and taking swift actions to contain and eradicate any threats detected.

For further information on the findings and recommendations, refer to the full reports by the Google Threat Intelligence Group and associated cybersecurity firms.

Explore our services and stay protected against evolving threats. Contact us at [undefined] or visit [undefined] for more information.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

Instagram Vulnerability Exposes Private Data of Millions
Instagram security

Instagram Vulnerability Exposes Private Data of Millions

Instagram's private posts exposed, millions affected by data breaches, and new location features pose risks. Discover how Gopher Security's AI-powered Zero-Trust architecture protects your data. Learn more!

By Brandon Woo January 27, 2026 4 min read
common.read_full_article
Closing the Cloud Complexity Gap: Insights from 2026 Security Reports
cloud security

Closing the Cloud Complexity Gap: Insights from 2026 Security Reports

Navigate the escalating complexity of cloud security. Discover how AI, Zero-Trust, and unified ecosystems are essential to combatting modern threats. Learn more!

By Divyansh Ingle January 26, 2026 6 min read
common.read_full_article
AI-Driven Cybersecurity Innovations: The Future of Threat Prevention
AI agents security

AI-Driven Cybersecurity Innovations: The Future of Threat Prevention

AI agents are prime targets for cyberattacks. Discover evolving threats like prompt injection & AI-powered exploits, and learn how to fortify your defenses. Read now!

By Brandon Woo January 22, 2026 5 min read
common.read_full_article
GootLoader Malware Evades Detection Using Nested ZIP Archives
GootLoader

GootLoader Malware Evades Detection Using Nested ZIP Archives

GootLoader is back with advanced tricks, using malformed ZIPs to bypass security & target businesses. Learn how to detect and defend against this threat. Protect your assets!

By Edward Zhou January 21, 2026 3 min read
common.read_full_article