Google Threat Intelligence Group (GTIG) and Mandiant have uncovered an ongoing exploitation campaign targeting end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances. This attack, attributed to UNC6148, involves a sophisticated rootkit named OVERSTEP, used to maintain persistent access, exfiltrate credentials, and potentially enable extortion and ransomware operations.
Severity Level: High
Threat Overview
- Threat Actor: Financially motivated group UNC6148, possibly tied to ransomware gang VSOCIETY.
- Campaign Scale: Ongoing since at least October 2024; multiple organizations affected.
- Affected Products / Versions: Fully patched end-of-life SonicWall SMA 100 series appliances.
- Malware: OVERSTEP – a persistent user-mode rootkit and backdoor.
- Attack Vectors: Reuse of stolen credentials, likely exploitation of known and possibly zero-day vulnerabilities.
Attack Flow
1. Initial Compromise
- Entry Vector: Possibly exploitation of,
- CVE-2021-20038 – RCE via memory corruption.
- CVE-2024-38475 – Path traversal allowing SQLite DB exfiltration (e.g., persist.db, temp.db with OTPs).
- CVE-2021-20035, 20039, 2025-32819 – Authenticated RCE and credential reset vectors.
- Credential Access: UNC6148 used admin credentials they likely exfiltrated in earlier campaigns.
- Date of Initial Access: As early as January 2025 via observed network metadata.
2. Establishing Persistence via SSL VPN
- In June 2025, UNC6148 initiated SSL VPN access using local admin credentials.
- Access originated from 193.149.180[.]50 (BitLaunch VPS).
- Once connected, they spawned a reverse shell, exported/imported appliance settings, and modified network access rules.
3. Deployment of OVERSTEP Backdoor
- The attacker:
- Decoded a base64 payload to a file /cf/xxx.elf.
- Renamed and moved it to /usr/lib/libsamba-errors.so.6.
- Appended this path to /etc/ld.so.preload, ensuring persistent loading on every process start.
- Timestomping and chmod 777 made detection harder.
- Persistence achieved by modifying bootloader script rc.fwboot to reinject the backdoor into INITRD.GZ, which is loaded at boot.
4. INITRD Bootloader Hijack Process
- UNC6148 modified the SMA’s boot sequence:
- Decompressed INITRD.GZ, mounted it, and inserted malicious .so file.
- Recompressed and replaced the INITRD file with the infected one.
- Used kexec to soft reboot into the infected kernel with OVERSTEP preloaded.
5. OVERSTEP Rootkit Capabilities
- Hijacks libc functions (open, write, readdir) to:
- Launch reverse shells (dobackshell).
- Exfiltrate sensitive files (dopasswords) like:
- /tmp/temp.db
- /etc/EasyAccess/var/conf/persist.db
- /etc/EasyAccess/var/cert/
- Places TAR archive in web directory: /usr/src/EasyAccess/www/htdocs/ with chmod 777.
6. Log Cleansing and Anti-Forensics
- OVERSTEP uses sed to delete its own traces from:
- /var/log/httpd.log
- /var/log/http_request.log
- /var/log/inotify.log
This limits forensic visibility into command execution and secondary actions.
7. Command Execution via HTTP
- Commands embedded in HTTP queries
- The malicious write function intercepts these requests, parses the buffer, and executes commands in memory.
8. Post-Compromise Observations
- Minimal lateral movement was observed.
- Evidence of beaconing traffic and persistence, but not active ransomware deployment (yet).
- One compromised organization showed up on “World Leaks” in June 2025.
Recommendations
- Reset ALL credentials on impacted and potentially exposed SMA appliances.
- Decommission end-of-life (EOL) SMA 100 series devices. These are unsupported and not receiving security updates. Replace with supported alternatives and ensure firmware is kept up to date.
- Acquire full disk images and perform offline forensic analysis looking for:
o /etc/ld.so.preload (should not exist on SMA)
o /usr/lib/libsamba-errors.so.6 (malicious .so file)
o Modified INITRD and rc.fwboot script - Look for unexpected binaries in /cf/ and /usr/lib/.
- Monitor for:
o HTTP requests with suspicious query parameters: dobackshell, dopasswords
o VPN logins from unusual IPs or geo-locations, especially low-reputation hosting services
o Events such as: “Current settings exported/imported”, “Clear all logs manually”
o Creation of TAR files in web directories (/usr/src/EasyAccess/www/htdocs/) - Revoke and reissue any SSL certificates stored or used by the SMA appliance.
- Block the IOCs at their respective controls.
https://www.virustotal.com/gui/collection/b1562abeffbc37865c4a3ecb6dc1cc359c28ff6575ca4ae899476dcf61cf3869/iocs
Source:
- https://cloud.google.com/blog/topics/threat-intelligence/sonicwall-secure-mobile-access-exploitation-overstep-backdoor
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.