Press ReleaseIdentity & AccessThreat Detection & Defense

Google Threat Intelligence Group Uncovers UNC6148 on SonicWall Secure Mobile Access 100 Series Appliances

Limited Number of Victims So Far But Threat Persists to This Day

Google Threat Intelligence Group has published new research (available HERE) that uncovers a previously unknown backdoor—UNC6148—that threat actors are deploying on fully patched SonicWall Secure Mobile Access (SMA) 100 series appliances.

In the study, Google Threat Intelligence Group identified UNC6148, a sophisticated threat actor, opportunistically exploiting fully patched, end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances.

The actor is deploying a newly discovered, persistent backdoor and user-mode rootkit named OVERSTEP. This backdoor covertly modifies the appliance’s boot process to maintain persistence and enables the theft of user credentials, session tokens, and one-time password (OTP) seeds.

While the initial access vector remains unknown, Google Threat Intelligence Group has assessed with moderate confidence that the threat is likely leveraging known and unknown vulnerabilities to steal credentials, establish persistent access, and achieve remote code execution to deploy OVERSTEP, underscoring the advanced nature of this threat.

The number of known victims at this time is limited, and Google Threat Intelligence Group has been proactively notifying impacted organisations. Organisations with these devices are urged to analyse the devices for potential compromise and evidence of lateral movement.

Key Findings on UNC6148

  • Data Theft and Extortion Link: UNC6148’s operations have been active since at least October 2024, and are suspected to enable data theft, extortion, and potentially ransomware deployment. However, Google Threat Intelligence Group  does not have enough data yet to confidently assess whether the threat is a financially motivated actor.
  • Conceal its own components: The backdoor is designed to hide itself and selectively remove log entries, making detection and forensic investigation incredibly difficult. During an investigation, Mandiant observed UNC6148 exporting and re-importing SMA appliance settings, including new network access control rules for their own IP addresses. This suggests UNC6148 modified the settings offline prior to re-importing it to ensure continuous access to their infrastructure. In addition, it also took steps to cover their traces and eliminate forensic evidence.
  • Recommendations: All organisations with SMA 100 series appliances should perform analysis to determine if they have been compromised by following the steps outlined in the “Hunting and Detection” section of Google Threat Intelligence Group’s research.

Martin Dale Bolima

Martin has been a Technology Journalist at Asia Online Publishing Group (AOPG) since July 2021, tasked primarily to handle the company’s Disruptive Tech Asia and Disruptive Tech News online portals. He also contributes to Cybersecurity ASEAN and Data&Storage ASEAN, with his main areas of interest being artificial intelligence and machine learning, cloud computing and cybersecurity. A seasoned writer and editor, Martin holds a degree in Journalism from the University of Santo Tomas in the Philippines. He began his professional career back in 2006 as a writer-editor for the University Press of First Asia, one of the premier academic publishers in the Philippines. He next dabbled in digital marketing as an SEO writer while also freelancing as a sports and features writer.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *