Beyond the Alerts: SonicWall Exploitation
Episode Summary:
In this edition of Beyond the Alerts, the Blackpoint Response Operations Center (BROC) team shares frontline insights into SonicWall exploitation and the fast-moving ransomware group Akira. With experts from detection engineering, MDR analysis, and threat operations, the session highlights real-world incidents, attacker tradecraft, and how Blackpoint’s layered defenses—especially Managed Application Control (MAC)—help partners stop breaches before ransomware can deploy.
What You’ll Learn:
- How Managed Application Control (MAC) provides curated blocklists and custom rules to stop adversary tradecraft while notifying analysts for deeper investigation.
- How BROC unites the SOC, Threat Detection & Automation (TDAO), and Adversary Pursuit Group (APG) to deliver real-time threat intelligence.
- Why SonicWall SSL VPN vulnerabilities are being rapidly exploited for initial access.
- Tactics used by Akira and other ransomware operators: lateral movement, service account abuse, credential dumping, and persistence creation.
- Real-world case study: 82 SonicWall-related incidents stopped pre-ransomware by Blackpoint’s SOC.
- Key TTPs defenders should hunt for, including rogue LDAP account activity, LSASS dumps with ProcDump, and tools staged in program data.
- How attackers blend in by creating accounts that mimic legitimate services (e.g., “backupSQL”).
- The role of automation in rapid containment—such as subnet isolation and DC lockdowns to prevent escalation.
- Why detection alone isn’t enough—blocking tools like ProcDump, Rclone, and unauthorized remote access software can buy critical time.
DATE PUBLISHEDSeptember 10, 2025
AUTHORBlackpoint Cyber
SHARE ON
2026 Annual Threat Report
What actually worked for attackers in 2025.
Most attackers aren’t breaking in
They’re logging in
Explore the real patterns behind modern intrusions in the 2026 Annual Threat Report