Google Alerts on OVERSTEP Backdoor Targeting SonicWall SMA Devices
Exploitation of SonicWall SMA 100 Appliances by UNC6148
Overview of Malicious Activity
The Google Threat Intelligence Group (GTIG) has identified a continuous campaign targeting fully patched end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances. The threat actor, referred to as UNC6148, exploits stolen credentials and one-time password (OTP) seeds to regain access to these devices even after security updates are applied. The campaign began at least as early as October 2024, with the actors leveraging known vulnerabilities, including CVE-2021-20035, CVE-2021-20038, CVE-2021-20039, CVE-2024-38475, and CVE-2025-32819.
Image courtesy of The Record from Recorded Future News
Deployment of OVERSTEP Backdoor
A novel aspect of the UNC6148 campaign is the deployment of a backdoor named OVERSTEP. This malware modifies the boot process of the SonicWall appliance, allowing for persistent access, credential theft, and concealment of its components. The malware is specifically designed for the SMA 100 series, which has reached end-of-life status. The GTIG suspects that UNC6148 may have utilized an unknown zero-day remote code execution vulnerability to execute OVERSTEP on targeted devices.
Mandiant's analysis shows that UNC6148 first established an SSL-VPN session using stolen local administrator credentials before spawning a reverse shell. This access is atypical for the appliance's design, suggesting the use of advanced techniques or unknown vulnerabilities.
Image courtesy of Cybersecurity Dive
Attack Vector and Techniques
The initial entry point for UNC6148 remains unclear, but it is believed that they might have utilized known vulnerabilities to exploit the devices. The malware is designed to erase log entries, complicating forensic investigations and making it difficult to trace the origin of the breach.
According to reports, organizations receiving the attacks are advised to reset OTP bindings to mitigate unauthorized access. SonicWall has confirmed that they are actively investigating the incidents and providing updates to their customers.
Persistence and Evasion Techniques
OVERSTEP incorporates user-mode rootkit capabilities that allow it to hide its components and activities on the compromised appliances. It modifies essential system files and hooks API functions to prevent detection. For example, the malware hijacks the open
and readdir
functions to conceal its presence from directory listings.
The primary commands executed by OVERSTEP include:
- dobackshell: Initiates a reverse shell connection to the attacker's server.
- dopasswords: Archives sensitive files for exfiltration.
Recommended Actions for Organizations
Organizations using SonicWall SMA appliances should undertake immediate investigations to ascertain if they have been compromised. Key recommendations include:
- Acquiring disk images for forensic analysis.
- Resetting all credentials, including passwords and OTP bindings.
- Engaging with SonicWall for guidance on mitigating the threat.
Researchers emphasize the importance of analyzing disk images for indicators of compromise and taking swift actions to contain and eradicate any threats detected.
For further information on the findings and recommendations, refer to the full reports by the Google Threat Intelligence Group and associated cybersecurity firms.
Explore our services and stay protected against evolving threats. Contact us at [undefined] or visit [undefined] for more information.