Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

SonicWall has been working with Mandiant and other trusted third parties to identify the nature of the threat, which uses stolen credentials to install ransomware on affected devices. This new ransomware threat is described as “imminent,” meaning that you absolutely need to take this seriously. If you don’t, you run the risk of ransomware threats ravaging your technology. Communication has been sent out from SonicWall to affected customers.

Thankfully, the vulnerability that allowed these attacks to occur has been patched in more recent versions of the firmware, although SonicWall does state in its notice, “SonicWall PSIRT strongly suggests that organizations still using 8.x firmware review the information below and take immediate action.” The “information below,” in this case, details which devices are affected, how they are affected, and what must be done to resolve these vulnerabilities. In most cases regarding devices that have reached their end of life, the company recommends taking affected devices offline and resetting all associated credentials, but in the case of devices which are still supported, updating to the most recent firmware should also do the trick. SonicWall also urges users to change passwords and enable multi-factor authentication.

SonicWall apparently understands that it is not always easy to upgrade away from legacy technology. In response to this threat, they issued the following statement: To provide a transition path for customers with end-of-life devices that cannot upgrade to 9.x or 10.x firmware, we’re providing a complimentary virtual SMA 500v until October 31, 2021. This should provide sufficient time to transition to a product that is actively maintained.” It must be mentioned that this is only a short-term solution, not a long-term one.

These types of threats that strike out at software and unsupported firmware which has reached its end of life are not uncommon. All good things must come to an end eventually, including your technology solutions. It is your responsibility to make sure that your organization is only using technology that is currently supported by its developers. Failing to do so is asking for trouble, and you are only shooting yourself in the foot by ignoring them in favor of using older technology.

**Keep in mind, if we’re managing your IT and cybersecurity infrastructure, we’re handling all of your security updates. If you aren’t sure, reach out to us to ensure your agreement covers this type of support.**

Voyage Technology can help you address issues with your IT infrastructure where you might still be using older unsupported technologies. We can address any shortcomings with your network and handle the process of upgrading to better, more secure technology. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery Android AI Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Information Holiday Facebook Miscellaneous Automation Covid-19 Cloud Computing Training Gadgets Remote Work Compliance Server Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Windows 10 Wi-Fi Virtualization Business Technology Mobile Office Data Security Vendor Two-factor Authentication Apps Chrome Budget Apple Networking App Mobile Device Management Managed Services Voice over Internet Protocol Gmail BYOD WiFi Employer-Employee Relationship Tip of the week Conferencing Hacker Avoiding Downtime How To Marketing BDR HIPAA Computing Applications Information Technology Access Control Office 365 Augmented Reality Retail Computers Storage Password Bring Your Own Device Managed IT Services 2FA Website Operating System Healthcare Router Virtual Private Network Risk Management Big Data Health Help Desk Analytics Office Tips Document Management Solutions Customer Service Telephone Scam Data loss Windows 11 Cooperation Excel Going Green Patch Management Save Money Firewall Remote Monitoring Remote Workers End of Support Vulnerability Vendor Management Cybercrime Physical Security The Internet of Things Display Free Resource Printer Project Management Paperless Office Social Windows 7 Infrastructure Monitoring Microsoft 365 Money Saving Time Humor Employees Hacking Managed IT Service Integration Maintenance Presentation Sports Downloads Antivirus Mouse Wireless Technology Licensing Holidays Entertainment Administration Data Storage Supply Chain Video Conferencing Word Managed Services Provider Robot Virtual Machines Professional Services Telephone System Cost Management Settings Wireless Printing Content Filtering IT Management VPN Safety YouTube Meetings iPhone Cryptocurrency User Tip Modem Vulnerabilities Data Privacy Processor Computer Repair Mobile Security Virtual Desktop Images 101 Data storage LiFi Multi-Factor Authentication Mobility Smart Technology Outlook Customer Relationship Management Machine Learning Lenovo Screen Reader Videos Writing Distributed Denial of Service Electronic Health Records Workforce Wasting Time Threats Service Level Agreement Competition Virtual Reality Computing Infrastructure Scary Stories Private Cloud Identity Trend Micro Security Cameras Workplace Strategies Hacks Server Management Superfish Bookmark Identity Theft Smart Tech Fun Software as a Service Meta Managing Costs Amazon Deep Learning Download Twitter Alerts Error User eCommerce SSID Browsers Education Connectivity Social Engineering Break Fix Surveillance Virtual Assistant Outsource IT Virtual Machine Environment Media Upload Remote Computing IP Address Reviews Multi-Factor Security Medical IT Mobile Computing Social Network Transportation Small Businesses Tablet IoT Search Dark Web Development Hypervisor Displays Best Practice Trends Alert Buisness File Sharing Regulations Shopping Recovery Dark Data Google Calendar Optimization PowerPoint Managed IT Customer Resource management Employer/Employee Relationships Outsourcing Legal Data Analysis IT solutions Star Wars Hard Drives How To Microsoft Excel PCI DSS Navigation Business Growth Gamification Domains Notifications Staff Travel Social Networking Gig Economy Legislation Workplace Teamwork Hiring/Firing Techology Fileless Malware Google Maps Refrigeration Cortana Internet Service Provider Regulations Compliance Evernote Paperless Alt Codes Content Public Speaking Wearable Technology Lithium-ion battery Downtime Unified Threat Management Motherboard Comparison Memes Co-managed IT Health IT SQL Server Technology Care Unified Threat Management Directions Hosted Solution Assessment Permissions Net Neutrality Entrepreneur Financial Data History Business Communications Typing Smartwatch Network Congestion Specifications IT Scams Azure Hybrid Work Google Drive User Error Microchip Internet Exlporer Undo Knowledge Fraud Procurement Telework Cyber security Tech Human Resources Username Point of Sale CES 5G Black Friday Communitications Cables Google Docs Unified Communications Database Experience Supply Chain Management Running Cable Tech Support IT Technicians FinTech Term Google Apps Bitcoin Network Management Google Wallet Proxy Server Cookies Application Monitors Cyber Monday IT Assessment IT Maintenance Value Business Intelligence Tactics Hotspot Flexibility Laptop Websites Mirgation Organization Shortcuts Windows 8 IBM Drones Nanotechnology Digital Security Cameras Smart Devices Ransmoware Memory Vendors SharePoint Addiction Electronic Medical Records Language Remote Working Halloween Chatbots Data Breach Google Play Be Proactive Management

Blog Archive