Stay up to date the most pressing cyber threats, emerging trends and what they mean for enterprise security, critical infrastructure and global risk.

9 Aug – 15 Aug, 2025 | TLP: CLEAR 

 

EXECUTIVE SUMMARY

The August 9-15, 2025 timeframe includes state-sponsored infrastructure attacks and  sophisticated criminal operations consistent with the continuing severity of the threat  landscape. This report highlights several high-priority intelligence items requiring  immediate executive attention, including active exploitation of managed service provider  infrastructure, zero-day vulnerabilities in enterprise identity systems, and demonstrated  state control over critical infrastructure.

Multiple critical vulnerabilities created cascading organizational risks, with N-able RMM  platform compromise affecting managed service providers and their downstream  customers, FortiSIEM active exploitation targeting security monitoring infrastructure, and  Microsoft Kerberos zero-day enabling complete domain takeover. State-sponsored actors  demonstrated operational control over Norwegian water systems, while criminal groups  rapidly adopted nation-state techniques including custom EDR evasion platforms and  sophisticated driver-based attacks.

CRITICAL INCIDENTS

1. N-able N-Central RMM Platform Mass Compromise

CISA added CVE-2025-8875 (insecure deserialization) and CVE-2025-8876 (command  injection) to the Known Exploited Vulnerabilities catalog on August 13, confirming active  exploitation of N-able N-Central RMM platform affecting managed service providers  nationwide.1 Federal agencies must remediate by August 20, 2025, while MSPs face  cascading risk to all downstream customers. The vulnerabilities affect versions prior to  2025.3.1 and enable authenticated attackers to achieve remote code execution on  management infrastructure.2

Analyst Comment: MSP compromise creates exponential risk multiplication, potentially  affecting hundreds of organizations per compromised provider.

2. FortiSIEM Critical Security Infrastructure Under Attack

CVE-2025-25256 enables unauthenticated OS command injection in FortiSIEM with  practical exploit code discovered circulating in criminal forums.3 The vulnerability affects  core security monitoring infrastructure used by enterprises for threat detection, creating  operational blind spots during compromise. Fortinet confirmed active exploitation  attempts with attackers targeting TCP port 7900 to deploy persistent backdoors on SIEM  platforms across multiple organizations.

Analyst Comment: Compromise of security monitoring platforms enables attackers to  operate undetected while manipulating security alerts and forensic evidence.

3. Microsoft Kerberos Zero-Day Domain Infrastructure Takeover

Microsoft disclosed CVE-2025-53779, the "BadSuccessor" Kerberos vulnerability enabling  complete Active Directory compromise through relative path traversal attacks on delegated  Managed Service Accounts.4 Research demonstrated privilege escalation from any  authenticated user to domain administrator, affecting all Windows domain environments.  Canada's House of Commons suffered confirmed exploitation on August 9, exposing  employee data including names, job titles, office locations, and email addresses.5

Analyst Comment: The combination of public disclosure and confirmed government  exploitation demonstrates immediate domain infrastructure risk across all sectors.

4. CyberArk and HashiCorp Vault Critical Authentication Bypass

Fourteen vulnerabilities disclosed in enterprise secure vaults enable remote vault takeover  without credentials, affecting CyberArk (CVE-2025-49827) and HashiCorp Vault (CVE 2025-6000) systems.6 The vulnerabilities include authentication bypasses, privilege  escalation, and remote code execution flaws that compromise corporate identity system  infrastructure. Responsible disclosure occurred in May 2025 with patches now available for  immediate deployment across all vault installations.

Analyst Comment: Vault compromise enables attackers to access all stored credentials  and secrets, creating complete organizational identity infrastructure failure.

5. Norwegian Critical Infrastructure Demonstration Attack

Pro-Russian threat actors successfully demonstrated operational control over Norwegian  Bremanger dam water flow systems, releasing 7.2 million liters in April 2025 with  disclosure delayed until August 14.7 Norwegian PST confirmed attribution to state sponsored groups with video evidence published on Telegram featuring pro-Russian  watermarks. The attack represents demonstration of capability rather than maximum  damage intent, indicating preparation for future escalation scenarios.

Analyst Comment: Demonstration attacks against critical infrastructure indicate state  preparation for strategic escalation scenarios against Western targets.

6. Cisco Maximum Severity RADIUS Infrastructure Vulnerability

CVE-2025-20265 represents maximum severity (CVSS 10.0) unauthenticated remote code  execution vulnerability in Cisco Secure Firewall Management Center RADIUS subsystem.8 Path traversal enables arbitrary shell command injection on FMC Software releases 7.0.7 and 7.7.0 with RADIUS authentication enabled. The vulnerability affects critical network  security infrastructure with immediate emergency patching required for all affected  systems.

Analyst Comment: Maximum severity vulnerabilities in network security infrastructure  create immediate organizational compromise risk.

ACTIVE THREAT ACTORS

RomCom (Russian APT Group)

Russian-aligned espionage group maintaining sustained zero-day exploitation capabilities  with confirmed operations across Europe and Canada targeting critical sectors. Current  campaign exploits WinRAR CVE-2025-8088 through sophisticated spearphishing delivering  Mythic Agent, SnipBot, and MeltingClaw backdoors.9 Group demonstrates advanced  operational security with alternate data stream abuse and precision targeting of finance,  manufacturing, defense, and logistics organizations. ESET research confirms third  documented zero-day exploitation, indicating substantial resource allocation and strategic  focus.

Akira Ransomware Affiliates

Criminal ransomware operation demonstrating rapid technical evolution with  sophisticated BYOVD (Bring Your Own Vulnerable Driver) techniques targeting VPN  infrastructure. Recent campaigns against SonicWall SSL VPN (CVE-2024-40766) employ  legitimate signed drivers (rwdrv.sys, hlpdrv.sys) to terminate security processes before  encryption deployment.10,11,12 GuidePoint Security confirmed campaign activity from late  July through early August 2025 with focus on enterprise VPN infrastructure and managed  service providers.

Charon Ransomware Group (Earth Baxia Techniques)

Sophisticated ransomware operator employing China-linked Earth Baxia APT techniques  targeting Middle East public sector and aviation industries.13 Technical analysis reveals DLL  side-loading via Edge.exe → msedge.dll (SWORDLDR) → process injection into svchost.exe  with dormant anti-EDR capabilities (Dark-Kill project). Group utilizes Curve25519 +  ChaCha20 hybrid cryptography with partial encryption strategy, network propagation via  NetShareEnum, and mutex "OopsCharonHere" for operational coordination.

ShinyHunters and Scattered Spider Criminal Merger

Elite cybercriminal groups announced operational merger creating enhanced data  extortion capabilities with 12% increase in financial sector targeting since July 2025.14

Combined operations leverage ShinyHunters' data theft expertise with Scattered Spider's  social engineering and infrastructure access capabilities. Recent collaboration  compromised Allianz Life Salesforce instance exposing 2.8 million customer records  including names, addresses, phone numbers, dates of birth, Tax IDs, and professional  licenses.15

Fortinet Infrastructure Targeting Coalition

Coordinated threat campaign involving 780+ unique IP addresses conducting synchronized  brute-force attacks against Fortinet SSL VPN infrastructure with shift to FortiManager  targeting.16 Geographic distribution spans US, Canada, Russia, Netherlands with primary  targeting of US, Hong Kong, Brazil infrastructure. Peak activity observed August 3, 2025,  indicating coordinated criminal or state-sponsored operations against enterprise VPN and  management infrastructure.

TRENDS

Criminal Adoption of Nation-State Techniques

Intelligence confirms accelerated adoption of advanced persistent threat methodologies  by criminal ransomware operators, with Charon ransomware incorporating Earth Baxia APT  techniques and Crypto24 deploying custom EDR evasion platforms.17,18 Crypto24 group  targets finance, manufacturing, entertainment, and technology sectors across US, Europe,  and Asia using custom RealBlindingEDR variant designed to defeat 12+ security vendors.  Analysis reveals criminal groups now employ DLL side-loading, BYOVD techniques, and  sophisticated anti-forensics previously exclusive to nation-state actors.

Identity Infrastructure Vulnerability Cascade

Multiple simultaneous disclosures of critical vulnerabilities across enterprise identity  management platforms created unprecedented attack surface expansion. Affected  systems include Microsoft Kerberos (CVE-2025-53779), CyberArk Vault (CVE-2025-49827),  HashiCorp Vault (CVE-2025-6000), and Cisco FMC RADIUS (CVE-2025-20265) with CVSS  scores of 7.2-10.0.19,20,21 Pattern suggests coordinated vulnerability research targeting  foundational authentication systems enabling complete organizational compromise  without traditional credential theft.

Android Critical Infrastructure Mobile Targeting

Google addressed critical Android vulnerabilities affecting billions of devices, including  CVE-2025-21479 and additional GPU micronode vulnerabilities enabling device  compromise without user interaction.22 Assessment confirms targeting of Android 13, 14,  15, and 16 with Qualcomm Adreno GPUs powering critical enterprise and consumer

infrastructure. Vulnerability pattern indicates systematic research targeting mobile  infrastructure supporting critical business operations and government systems.

VULNERABILITIES

Critical Patches Required This Week

 

Critical Patches Required This Week

Continuing Active Exploitation

Continuing Active Exploitation
Continuing Active Exploitation

RECOMMENDATIONS

Immediate Actions (0-24 Hours)

  • Deploy Microsoft August 2025 patches immediately, prioritizing CVE-2025-53779 in all domain environments with focus on dMSA configurations
  • Emergency patching of FortiSIEM CVE-2025-25256 or immediate restriction of TCP port 7900 access for all FortiSIEM deployments
  • Audit and patch all N-able N-Central RMM deployments before August 20 CISA deadline; consider temporary service suspension if patching not feasible
  • Conduct emergency assessment of CyberArk and HashiCorp Vault configurations with immediate access control review and privilege validation
  • Implement emergency patching for Cisco FMC RADIUS systems (CVE-2025-20265) or disable RADIUS authentication pending patches

  1. The Hacker News. (2025, August 13). CISA alerts on N-able N-Central deserialization and injection flaw under active exploitation. The Hacker News. https://thehackernews.com/2025/08/cisa-adds-two-n-able-n-central-flaws-to.html
  2. Cybersecurity and Infrastructure Security Agency. (2025, August 13). CISA adds two known exploited vulnerabilities to catalog. CISA News. https://www.cisa.gov/news-events/alerts/2025/08/13/cisa-adds-two-known-exploited-vulnerabilities-catalog
  3. The Hacker News. (2025, August 13). CISA alerts on N-able N-Central deserialization and injection flaw under active exploitation. The Hacker News. https://thehackernews.com/2025/08/cisa-adds-two-n-able-n-central-flaws-to.html
  4. The Hacker News. (2025, August 15). Microsoft August 2025 Patch Tuesday fixes Kerberos zero-day among 111 total new flaws. The Hacker News. https://thehackernews.com/2025/08/microsoft-august-2025-patch-tuesday.html
  5. BleepingComputer. (2025, August 14). Canada's House of Commons investigating data breach after cyberattack. BleepingComputer. https://www.bleepingcomputer.com/news/security/canadas-house-of-commons-investigating-data-breach-after-cyberattack/
  6. The Hacker News. (2025, August 14). CyberArk and HashiCorp flaws enable remote vault takeover without credentials. The HackerNews. https://thehackernews.com/2025/08/cyberark-and-hashicorp-flaws-enable.html
  7. BleepingComputer. (2025, August 14). Pro-Russian hackers blamed for water dam sabotage in Norway. BleepingComputer. https://www.bleepingcomputer.com/news/security/pro-russian-hackers-blamed-for-water-dam-sabotage-in-norway/
  8. The Hacker News. (2025, August 14). Cisco warns of CVSS 10.0 FMC RADIUS flaw allowing remote code execution. The Hacker News. https://thehackernews.com/2025/08/cisco-warns-of-cvss-100-fmc-radius-flaw.html
  9. BleepingComputer. (2025, August 11). Details emerge on WinRAR zero-day attacks that infected PCs with malware. BleepingComputer. https://www.bleepingcomputer.com/news/security/details-emerge-on-winrar-zero-day-attacks-that-infected-pcs-with-malware/
  10. GuidePoint Security. (2025, August 8). GRITREP: Observed malicious driver use associated with Akira SonicWall campaign. GuidePoint Security. https://www.guidepointsecurity.com/blog/gritrep-akira-sonicwall/
  11. CyberPress. (2025, August 8). Akira ransomware uses Windows drivers to evade AV/EDR in SonicWall attacks. CyberPress. https://cyberpress.org/akira-ransomware-uses-windows-drivers/
  12. Arctic Wolf. (2025, August 8). Arctic Wolf observes July 2025 uptick in Akira ransomware activity targeting SonicWall SSL VPN. Arctic Wolf. https://arcticwolf.com/resources/blog-uk/arctic-wolf-observes-july-2025-uptick-in-akira-ransomware-activity-targeting-sonicwall-ssl-vpn-copy/
  13. Trend Micro. (2025, August 14). New ransomware Charon uses Earth Baxia APT techniques to target enterprises. Trend Micro Research. https://www.trendmicro.com/en_fi/research/25/h/new-ransomware-charon.html
  14. The Hacker News. (2025, August 14). Cybercrime groups ShinyHunters, Scattered Spider join forces in extortion attacks on businesses. The Hacker News. https://thehackernews.com/2025/08/cybercrime-groups-shinyhunters.html
  15. BleepingComputer. (2025, August 12). Hackers leak Allianz Life data stolen in Salesforce attacks. BleepingComputer. https://www.bleepingcomputer.com/news/security/hackers-leak-allianz-life-data-stolen-in-salesforce-attacks/
  16. The Hacker News. (2025, August 12). Fortinet SSL VPNs hit by global brute-force wave before attackers shift to FortiManager. The Hacker News. https://thehackernews.com/2025/08/fortinet-ssl-vpns-hit-by-global-brute.html
  17. Trend Micro. (2025, August 14). New ransomware Charon uses Earth Baxia APT techniques to target enterprises. Trend Micro Research. https://www.trendmicro.com/en_fi/research/25/h/new-ransomware-charon.html
  18. BleepingComputer. (2025, August 14). Crypto24 ransomware hits large orgs with custom EDR evasion tool. BleepingComputer. https://www.bleepingcomputer.com/news/security/crypto24-ransomware-hits-large-orgs-with-custom-edr-evasion-tool/
  19. The Hacker News. (2025, August 15). Microsoft August 2025 Patch Tuesday fixes Kerberos zero-day among 111 total new flaws. The Hacker News. https://thehackernews.com/2025/08/microsoft-august-2025-patch-tuesday.html
  20. The Hacker News. (2025, August 14). CyberArk and HashiCorp flaws enable remote vault takeover without credentials. The Hacker News. https://thehackernews.com/2025/08/cyberark-and-hashicorp-flaws-enable.html
  21. The Hacker News. (2025, August 14). Cisco warns of CVSS 10.0 FMC RADIUS flaw allowing remote code execution. The Hacker News. https://thehackernews.com/2025/08/cisco-warns-of-cvss-100-fmc-radius-flaw.html
  22. Malwarebytes. (2025, August 8). Critical Android vulnerabilities patched---update as soon as you can. Malwarebytes Labs. https://www.malwarebytes.com/blog/news/2025/08/android-critical-vulnerabilities-patched-update-as-soon-as-you-can