FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Marquis Sues SonicWall Over Ransomware Breach

Gregory Zuckerman
Last updated: February 24, 2026 5:23 pm
By Gregory Zuckerman
Technology
6 Min Read
SHARE

Fintech firm Marquis has filed a lawsuit against firewall maker SonicWall, alleging security failures in SonicWall’s cloud backup for firewalls enabled hackers to obtain sensitive configuration data and “scratch codes” passcodes later used to launch a ransomware attack on Marquis’ network. The complaint, lodged in the U.S. District Court for the Eastern District of Texas, seeks a jury trial.

The suit centers on a previously disclosed SonicWall breach that exposed customer firewall configuration backup files stored on cloud servers maintained by SonicWall. SonicWall initially said fewer than 5% of backups were exfiltrated before later acknowledging that every customer’s firewall backup files had been stolen. The company has not publicly detailed when attackers first accessed its systems.

Table of Contents
  • Allegations Center On Firewall Backup Exposure
  • What Was Stolen And Who Is Affected So Far
  • SonicWall Under Scrutiny For Cloud Backup Practices
  • Why Configuration Backups Matter To Ransomware Crews
  • Broader Market And Legal Implications For Vendors
  • What To Watch As The Lawsuit And Response Unfold
A black SonicWall TZ300 firewall appliance with a professional flat design background featuring soft geometric patterns.

Allegations Center On Firewall Backup Exposure

According to Marquis, the ransomware group did not break the firewall; it allegedly used information from SonicWall’s backup service to bypass it. The complaint asserts that backups included configuration details and emergency “scratch codes” used for break-glass access, which the intruders leveraged to enter Marquis’ internal network.

Marquis further claims SonicWall introduced a code change to a customer-facing API months before the breach that created an authentication flaw. The bug allegedly allowed threat actors to access firewall configuration backups by enumerating predictable serial numbers, pulling files “without proper authentication.” SonicWall has not commented on the new allegations.

What Was Stolen And Who Is Affected So Far

Marquis, which helps hundreds of banks and credit unions analyze customer data, says the attackers took personally identifiable information related to customers of some client financial institutions. Stolen data includes names, dates of birth, postal addresses, bank account details, debit and credit card numbers, and Social Security numbers.

The company began notifying affected individuals after discovering its own network intrusion months earlier. Marquis has not disclosed a total number of victims. A filing with the Texas Attorney General lists at least 400,000 impacted individuals across the U.S., a tally expected to rise as additional state notifications post.

SonicWall Under Scrutiny For Cloud Backup Practices

Backups of firewall configurations can be a treasure map for attackers. They often include rulesets, VPN and remote access settings, and emergency access mechanisms. When centralized in a vendor-managed cloud, these backups can create a high-value aggregation point—one compromise can cascade across many customers.

The shifting scope of SonicWall’s breach—first framed as a small fraction of customers and later acknowledged as affecting all backup users—adds pressure on the company to clarify controls around its storage environment and API security. Without timeline transparency, customers and regulators face gaps in understanding exposure windows and risk.

A SonicWall 4700 network security appliance with a professional flat design background featuring soft patterns and gradients.

Why Configuration Backups Matter To Ransomware Crews

Ransomware operators increasingly rely on credential theft and misconfiguration, not zero-day exploits. If attackers gain firewall configurations and emergency codes, they can pre-stage access, identify trusted pathways, and neutralize monitoring before detonating payloads. U.S. cybersecurity agencies have repeatedly warned that network appliance backups and admin credentials are prime targets.

Best practices from CISA and NIST stress isolating and encrypting configuration backups, using customer-managed keys, enforcing multifactor authentication for any backup access, and eliminating or tightly controlling break-glass credentials. Regular rotation of device passwords, VPN keys, and emergency codes is critical after any supplier-side breach.

Broader Market And Legal Implications For Vendors

The case spotlights supply chain risk in security tooling itself. High-profile incidents such as the Kaseya ransomware campaign and later identity provider compromises showed how a single vendor foothold can fan out across customers. Here, the alleged blast radius emerged from a defensive product’s cloud backup layer.

The litigation could test where liability sits when vendor-managed cloud services expose customer networks. Contracts around incident notification, audit rights, and recovery assistance will face renewed scrutiny. The stakes are high: Verizon’s 2023 Data Breach Investigations Report found ransomware present in roughly 24% of breaches, while IBM Security’s 2023 study put the average data breach cost at $4.45 million.

What To Watch As The Lawsuit And Response Unfold

Discovery may determine whether an API change and serial-number enumeration were the root cause, and what specific data within the backups enabled the attackers’ move from perimeter to core systems. Financial regulators and state attorneys general are likely to press for clarity on incident timelines and customer impact.

For now, enterprises using any firewall backup service should assume configuration data may be sensitive enough to enable intrusions at scale. Immediate steps typically include rotating all device credentials and emergency codes, regenerating VPN keys, validating backup encryption with customer-controlled keys, and reviewing firewall rules for unauthorized changes.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
Oracle Cloud ERP Outage Sparks Renewed Debate Over Vendor Lock-In Risks
Why Digital Privacy Has Become a Mainstream Concern for Everyday Users
The Business Case For A Single API Connection In Digital Entertainment
Why Skins and Custom Servers Make Minecraft Bedrock Feel More Alive
Why Server Quality Matters More Than You Think in Minecraft
Smart Protection for Modern Vehicles: A Guide to Extended Warranty Coverage
Making Divorce Easier with the Right Legal Support
What to Know Before Buying New Glasses
8 Key Features to Look for in a Modern Payroll Platform
How to Refinance a Motorcycle Loan
GDC 2026: AviaGames Driving Innovation in Skill-Based Mobile Gaming
Best Dumbbell Sets for Strength Training: An All-Time Buyer’s Guide
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.