EDR-Killer Malware Abuse via SonicWall SSLVPN Exploit Chain

Related

Female Cybersecurity Leaders to Watch in Maine

Maine’s cybersecurity leadership bench reflects a mix of operational...

Female Cybersecurity Leaders to Watch in Iowa

Iowa’s cybersecurity leadership reflects a blend of enterprise security,...

Female Cybersecurity Leaders to Watch in New Hampshire

New Hampshire’s cybersecurity leadership stands out for its mix...

Critical NVIDIA Vulnerabilities Enable RCE and DoS Attacks

What happened Critical NVIDIA vulnerabilities enable remote code execution and...

BIND Updates Patch High-Severity Vulnerabilities

What happened New BIND updates patch high-severity vulnerabilities that could...

Share

What happened

Security researchers have detailed a malware campaign in which attackers are chaining a SonicWall SSLVPN exploit with an EDR-killer component to disable endpoint defenses on compromised hosts. According to the report, threat actors have been scanning for internet-exposed SonicWall SSLVPN endpoints that remain unpatched for known vulnerabilities, using those access points to deliver a malicious payload to internal systems after authentication bypass. The delivered malware includes a module specifically designed to terminate and disable common Endpoint Detection and Response (EDR) products, clearing logs and blocking remediation tooling before executing secondary stages such as credential theft and persistent backdoor deployment. Analysis shows that the attackers leverage the compromised VPN access to move laterally into affected environments and systematically weaken host security controls to ensure long-term footholds.

Who is affected

Organizations running vulnerable SonicWall SSLVPN appliances that are internet-exposed and unpatched are affected, as attackers can use the exploit chain to gain initial access and then deploy an EDR-killer payload on internal endpoints.

Why CISOs should care

The combination of appliance exploitation with subsequent suppression of endpoint defenses increases risk by not only providing initial access but also eroding detection and response capabilities once inside, complicating containment and remediation.

3 practical actions

  • Patch SonicWall SSLVPN systems. Update appliances to address the known vulnerabilities enabling initial access.
  • Monitor endpoint defense status. Detect and alert on unexpected EDR service termination or disabling.
  • Audit lateral movement activity. Review internal logs for suspicious connections following SSLVPN access.