EDR-Killer Malware Abuse via SonicWall SSLVPN Exploit Chain

Related

Women in Cybersecurity With Fortune 500 Leadership Experience

For Women’s Month, this feature highlights cybersecurity leaders whose...

Google Sets 2029 Deadline for Quantum-Safe Cryptography

What happened Google set a 2029 deadline for quantum-safe cryptography...

State Department Launches Bureau of Emerging Threats

What happened The State Department launched a Bureau of Emerging...

Share

What happened

Security researchers have detailed a malware campaign in which attackers are chaining a SonicWall SSLVPN exploit with an EDR-killer component to disable endpoint defenses on compromised hosts. According to the report, threat actors have been scanning for internet-exposed SonicWall SSLVPN endpoints that remain unpatched for known vulnerabilities, using those access points to deliver a malicious payload to internal systems after authentication bypass. The delivered malware includes a module specifically designed to terminate and disable common Endpoint Detection and Response (EDR) products, clearing logs and blocking remediation tooling before executing secondary stages such as credential theft and persistent backdoor deployment. Analysis shows that the attackers leverage the compromised VPN access to move laterally into affected environments and systematically weaken host security controls to ensure long-term footholds.

Who is affected

Organizations running vulnerable SonicWall SSLVPN appliances that are internet-exposed and unpatched are affected, as attackers can use the exploit chain to gain initial access and then deploy an EDR-killer payload on internal endpoints.

Why CISOs should care

The combination of appliance exploitation with subsequent suppression of endpoint defenses increases risk by not only providing initial access but also eroding detection and response capabilities once inside, complicating containment and remediation.

3 practical actions

  • Patch SonicWall SSLVPN systems. Update appliances to address the known vulnerabilities enabling initial access.
  • Monitor endpoint defense status. Detect and alert on unexpected EDR service termination or disabling.
  • Audit lateral movement activity. Review internal logs for suspicious connections following SSLVPN access.