NHI Foundation Level Training Course Launched

How Stolen Credentials Enabled Mass Breach of SonicWall VPN Accounts

In October 2025, researchers disclosed a large‑scale campaign targeting SonicWall SSL VPN accounts. In this wave of attacks, threat actors successfully compromised over 100 VPN accounts across multiple customer environments, not by brute‑force, but by using stolen, valid credentials.

The campaign ,observed between October 4 and October 10, impacted at least 16 distinct customer environments protected by a managed security platform. Attackers moved rapidly through accounts, indicating coordinated credential misuse rather than random guessing.

What Happened

The sequence of events appears to be:

  • Starting October 4, 2025, attackers began logging into multiple SonicWall SSL VPN accounts across several organizations using valid but stolen credentials, suggesting prior credential theft or compromise, not brute‑force.
  • These logins originated from the same suspicious IP address (202.155.8[.]73), indicating a coordinated campaign rather than isolated incidents.
  • In some cases, attackers disconnected quickly after login. In others, they proceeded with internal scans and attempted to access local Windows accounts, indicators of reconnaissance or lateral movement inside networks.
  • The campaign affected more than a hundred accounts across at least 16 environments, signaling a broad and ongoing threat rather than a narrow, one-off breach.

Because the attackers used valid credentials, standard brute-force defenses would not necessarily detect the intrusion, making this a stealthy and effective threat vector.

What’s at Risk

This breach carries serious risks for affected organizations and beyond:

  • Unauthorized network access – VPN access often grants entry to internal networks, corporate resources, file servers, and more. Once the attacker has a foothold, they can attempt lateral movement.
  • Credential reuse risk – If the stolen credentials were reused across systems or windows accounts in the infrastructure, the breach could extend beyond VPN to internal systems.
  • Potential for ransomware or data theft – Threat actors with VPN-level access can deploy ransomware, exfiltrate sensitive data, or manipulate critical assets. Indeed, several subsequent compromises involving ransomware groups have leveraged SonicWall VPN access.
  • Erosion of trust in remote access infrastructure – Widespread credential leaks and VPN compromises undermine confidence in remote‑access tools, especially important as hybrid and remote work remain common.
  • Difficulty in detection – Because the attackers used legitimate credentials and valid login procedures, the breach may evade traditional intrusion detection methods focused on brute-force or exploitation signatures.

What Organizations Should Do Immediately

If your organization uses SonicWall SSL VPN or similar remote access infrastructure, it’s time for urgent action. Recommended steps:

  • Reset all SSL VPN passwords – treat every potentially impacted account as compromised. Rotate credentials immediately.
  • Invalidate unused or stale VPN accounts – minimize the attack surface by removing accounts not currently needed.
  • Enforce Multi-Factor Authentication (MFA) – add an extra authentication layer to reduce the risk of credential reuse or theft leading to successful logins.
  • Restrict remote access exposure – limit VPN access to known IP ranges, enforce geolocation restrictions, and disable VPN/WAN access when not needed.
  • Enable logging and monitoring of VPN activity – alert on unusual login patterns, unexpected VPN connections, or large-scale login attempts.
  • Audit and rotate any related credentials – if VPN access led to other sensitive credentials (e.g. service accounts, shared secrets, management credentials), rotate them too.
  • Segment internal networks – treat remote-access servers and VPN entry points as high-risk, and isolate or limit what they can directly access inside your network.
  • Regularly review backup configurations and cloud backupsbecause previous breaches of configuration backup services increased supply chain risk for firewall devices.

How NHI Mgmt Group Can Help

Incidents like this underscore a critical truth, Non-Human Identities (NHIs) are now at the center of modern cyber risk. OAuth tokens, AWS credentials, service accounts, and AI-driven integrations act as trusted entities inside your environment, yet they’re often the weakest link when it comes to visibility and control.

At NHI Mgmt Group, we specialize in helping organizations understand, secure, and govern their non-human identities across cloud, SaaS, and hybrid environments. Our advisory services are grounded in a risk-based methodology that drives measurable improvements in security, operational alignment, and long-term program sustainability.

We also offer the NHI Foundation Level Training Course, the world’s first structured course dedicated to Non-Human Identity Security. This course gives you the knowledge to detect, prevent, and mitigate NHI risks.

If your organization uses third-party integrations, AI agents, or machine credentials, this training isn’t optional; it’s essential.

Final Thoughts

The 2025 SonicWall VPN credential breach should serve as a wake‑up call. In a world where stolen credentials, not zero-day exploits, are driving large campaigns, organizations must treat remote-access credentials and VPN infrastructure as critical assets, requiring rigorous governance, monitoring, and rotation.

Relying on complex firewalls or VPN appliances is not enough. Security teams need to assume compromise is possible and adopt a defense-in-depth posture: minimize privileged access, enforce MFA, restrict exposure, rotate credentials regularly, and isolate trusted environments.

For organizations still using SSL VPNs, particularly with legacy configurations or without regular credential hygiene, the time to act is now.