Posted in

SonicWall Backup Breach Sparks Ransomware Lawsuit

A major SonicWall backup breach is now at the center of a federal lawsuit after Marquis Software Solutions alleged that exposed firewall configuration backups directly enabled a ransomware attack on its network.

Filed in a Texas federal court, the complaint claims that a vulnerability in SonicWall’s MySonicWall cloud backup infrastructure allowed attackers to download sensitive firewall configuration files — including unencrypted MFA scratch codes — without authentication.

For CISOs, security engineers, and enterprise decision-makers, this case highlights a critical reality:

Third-party cloud misconfigurations can undermine even well-secured, MFA-protected networks.

In this in-depth analysis, we examine:

  • What allegedly went wrong in the SonicWall backup breach
  • How exposed MFA codes enabled ransomware
  • The API vulnerability mechanics
  • Regulatory and compliance implications
  • Defensive lessons for organizations relying on cloud security providers

Background: Lawsuit Against SonicWall

SonicWall, a well-known firewall and network security vendor, is facing legal action from Marquis Software Solutions.

According to court filings:

  • August 14, 2025: Marquis suffers ransomware attack.
  • Investigation finds no unpatched local vulnerabilities.
  • Root cause traced to MySonicWall cloud backup infrastructure.
  • Exposed firewall configuration backups allegedly enabled intrusion.

Marquis claims negligence, gross negligence, and unjust enrichment — seeking full reimbursement for damages.


What Happened in the SonicWall Backup Breach?

The API Vulnerability

In February 2025, SonicWall reportedly introduced a code change to its cloud API.

The lawsuit alleges this change:

  • Allowed firewall backup downloads via predictable serial numbers.
  • Required no authentication.
  • Exposed configuration files across customer accounts.

In essence, if attackers guessed or enumerated device serial numbers, they could retrieve backup files.

This represents a classic Insecure Direct Object Reference (IDOR) vulnerability.

MITRE ATT&CK Mapping

  • T1190 – Exploit Public-Facing Application
  • T1078 – Valid Accounts
  • T1556 – Modify Authentication Process

Exposed Data: Why This Was So Dangerous

The firewall configuration backups reportedly contained:

  • Usernames
  • Local firewall passwords
  • SSL certificates
  • Network architecture details
  • Unencrypted MFA scratch codes

The Critical Failure: Unencrypted MFA Codes

Multi-Factor Authentication (MFA) is designed to prevent credential abuse.

However, scratch codes — meant as backup authentication factors — were stored unencrypted within the configuration backups.

This allegedly allowed attackers to:

  1. Access backup files.
  2. Extract MFA scratch codes.
  3. Bypass two-factor authentication.
  4. Access protected perimeter devices.

Key Security Insight:
MFA is only as strong as the protection of its recovery mechanisms.


Timeline of Disclosure

According to the lawsuit:

  • February 2025 – API change introduced.
  • August 14, 2025 – Marquis ransomware incident.
  • September 2025 – Suspicious activity reportedly detected.
  • October 2025 – Alleged admission that all customer backup files were exposed.

Initially, SonicWall allegedly stated only 5% of firewalls were affected. Later disclosures suggested broader exposure.

Delayed breach detection and underestimation of impact are central claims in the case.


How the Ransomware Attack Occurred

Marquis asserts that attackers:

  • Downloaded its firewall configuration backup.
  • Extracted unencrypted MFA scratch codes.
  • Bypassed perimeter MFA protection.
  • Gained internal network access.
  • Deployed ransomware.

Despite having:

  • SonicWall firewalls
  • MFA enabled
  • No unpatched local vulnerabilities

The breach allegedly originated from the vendor’s cloud environment.


Business & Legal Impact

Marquis now faces:

  • 30+ consumer class action lawsuits
  • Commercial trade secret litigation
  • Lost banking industry contracts
  • Reputational damage
  • Incident response and legal costs

This demonstrates the cascading impact of third-party cloud failures.


Compliance & Regulatory Implications

Marquis argues that storing MFA scratch codes unencrypted violates guidance from:

  • National Institute of Standards and Technology (NIST)
  • Cybersecurity and Infrastructure Security Agency (CISA)

Relevant Standards

NIST SP 800-63

Recommends secure handling of authentication secrets.

NIST CSF

Emphasizes:

  • PR.AC – Access Control
  • DE.CM – Continuous Monitoring
  • RS.AN – Incident Analysis

CISA Secure-by-Design Principles

Advocate:

  • Default secure configurations
  • Strong authentication protection
  • Cloud infrastructure monitoring

If proven, the case could set precedent around vendor liability in cloud security incidents.


Lessons for CISOs and Security Leaders

1. MFA Alone Is Not Enough

If recovery codes or backup authentication mechanisms are exposed, MFA protections can collapse.

Organizations must:

  • Encrypt MFA backup codes.
  • Rotate scratch codes regularly.
  • Treat them as sensitive credentials.

2. Vendor Risk Management Must Include Cloud Controls

Perform due diligence on:

  • API security practices
  • Data encryption standards
  • Backup storage architecture
  • Monitoring and detection capabilities

Ask vendors:

  • Are configuration backups encrypted at rest?
  • Are API endpoints authenticated and rate-limited?
  • Is serial number enumeration possible?

3. Monitor Third-Party Cloud Exposure

Implement:

  • Continuous vendor risk assessments
  • External attack surface monitoring
  • Cloud configuration audits
  • Contractual breach notification clauses

Zero Trust must extend beyond internal infrastructure.


4. Apply the Shared Responsibility Model Carefully

Even if infrastructure is vendor-managed:

  • You remain accountable for security impact.
  • Contracts should define liability boundaries.
  • Incident response plans must include vendor escalation procedures.

Common Security Misconceptions

“Our firewall is secure, so we’re protected.”

If cloud backups expose configuration data, the firewall becomes irrelevant.

“MFA prevents ransomware.”

MFA can be bypassed if backup codes are exposed.

“Cloud vendors handle everything.”

Cloud providers manage infrastructure — not your risk exposure.


Incident Response Recommendations

If your organization uses SonicWall cloud backups:

  1. Rotate firewall passwords immediately.
  2. Regenerate MFA scratch codes.
  3. Review access logs for unusual backup downloads.
  4. Audit API access history.
  5. Validate encryption of stored backups.

Proactive remediation reduces long-term liability.


FAQs

1. What is the SonicWall backup breach?

It refers to an alleged API flaw in SonicWall’s cloud backup system that exposed firewall configuration files.

2. How did attackers bypass MFA?

By extracting unencrypted MFA scratch codes from downloaded configuration backups.

3. What is an IDOR vulnerability?

An Insecure Direct Object Reference allows unauthorized access to resources through predictable identifiers.

4. Can this happen with other vendors?

Yes. Any cloud service with weak API access controls or unencrypted sensitive data could face similar risks.

5. What should organizations do now?

Audit firewall backup security, rotate credentials, and reassess vendor risk management practices.


Conclusion

The SonicWall backup breach lawsuit underscores a critical cybersecurity principle:

Security controls are only as strong as their weakest dependency.

Even with patched systems and MFA enabled, organizations can be compromised if third-party cloud services expose sensitive configuration data.

For CISOs and enterprise leaders, this case reinforces the need to:

  • Expand Zero Trust to vendor ecosystems
  • Encrypt authentication recovery mechanisms
  • Continuously monitor cloud API exposure
  • Strengthen contractual security accountability

As legal scrutiny intensifies around cloud vendor security, this case may redefine expectations for secure-by-design infrastructure.

Leave a Reply

Your email address will not be published. Required fields are marked *