UNC4540 targets unpatched SonicWall gateways with credential-stealing malware
According to a recent report from cybersecurity firm Mandiant, Chinese cybercriminals are targeting unpatched SonicWall gateways with credential-stealing malware that persists through firmware upgrades.
The spyware is targeting the SonicWall Secure Mobile Access 100 Series, which provides VPN access to remote users. The malware uses a bash script called firewalld
that executes an SQL command to steal credentials and run other components, including the TinyShell backdoor.
Mandiant is tracking the threat actor as UNC4540 and believes a *Beijing-backed *crew is behind the effort. The campaign is consistent with the pattern of Chinese threat actors targeting network devices for zero-day exploits.
SonicWall has released a firmware update to address this threat.
Indicator of Compromise
HASH |
---|
e4117b17e3d14fe64f45750be71dbaa6 |
2d57bcb8351cf2b57c4fd2d1bb8f862e |
559b9ae2a578e1258e80c45a5794c071 |
8dbf1effa7bc94fc0b9b4ce83dfce2e6 |
619769d3d40a3c28ec83832ca521f521 |
fa1bf2e427b2defffd573854c35d4919 |