Threat Landscape Summary (1 – 8 September, 2025)
This report covers key threats and incidents observed from 01–08 September 2025. The week was dominated by a multi-tenant Salesforce data theft campaign via stolen OAuth tokens (linked to Salesloft/Drift), a critical Sitecore zero‑day (CVE‑2025‑53690) under active exploitation, a large‑scale npm supply‑chain compromise, and Google’s September Android patch addressing two actively exploited zero‑days. Action is required for identity/token hygiene, rapid patching, and software supply‑chain controls.
Key Highlights
Dominant Trends
II. Global Cyber Threat Landscape Overview
Key Observations
III. Notable Security Incidents and Data Breaches
| Date (UTC) | Incident | Organization / Sector | Impact / Notes |
| 2025-09-02 to 09-05 | OAuth-token supply-chain via Salesloft/Drift → Salesforce data theft | Multiple vendors (Cloudflare, Palo Alto Networks, Zscaler, Workiva, others) | CRM data exfiltration; secrets hunting in support cases; token/credential rotation required |
| 2025-09-04 | Network incident | Bridgestone Americas | Operations/production impact under investigation (North America) |
| 2025-09-08 | Maintainer-phishing → malicious npm package versions | Popular npm packages (chalk, debug, supports-color, etc.) | Browser-side Web3/crypto interceptor injected into JS; risk to web apps using compromised bundles |
| 2025-09-08 | Nx breach fallout | Nx/Nrwl ecosystem | ~6,700 private repos made public; potential credentials/PII exposure; supply-chain hardening needed |
IV. Current Threat Landscape Analysis
Emerging Trends
CRM/Helpdesk exploitation of connected apps and tokens continues with mass exports, log tampering, Tor egress, and Python-based clients being observed.
Maintainer targeting at scale (npm) using look-alike domains and credential exfiltration URLs represents a significant supply chain risk.
Legacy ASP.NET deserialization paths via sample machine keys (Sitecore) with CISA KEV enforcement deadlines require immediate attention.
V. Critical Vulnerabilities and CVEs (Prioritize within 24–72h)
| CVE | Description | Severity | Mitigation / Notes |
| CVE-2025-53690 | Sitecore ViewState deserialization RCE due to exposed sample machine keys; actively exploited; CISA due date Sep 25 | Critical | Rotate machine keys; apply SC2025-005; hunt for WeepSteel/Dwagent/Earthworm; enforce ViewState MAC; WAF rules |
| CVE-2025-38352 | Android Linux kernel UAF—actively exploited | High/Critical | Patch to Sept-2025; gate mobile access via MDM; verify kernel levels |
| CVE-2025-48543 | Android Runtime code-exec—actively exploited | High/Critical | Patch; enforce Play Protect; restrict sideloading |
| npm supply-chain | Trojanized versions of widely used packages after maintainer phishing; browser-side crypto hijack | High | Freeze builds; pin/rollback; regenerate lockfiles; verify provenance/attestations (SLSA) |
VI. Threat Actor Activities
Profiles of active threat actors mapped to MITRE ATT&CK:
Salesforce data-theft operators linked in reporting to ShinyHunters
Objective: Data theft and credential harvesting Mapped TTPs:
npm supply-chain adversaries
Objective: Supply chain compromise Mapped TTPs:
Sitecore intrusions
Objective: System compromise and data exfiltration Mapped TTPs:
VII. Malware Spotlights
| Malware | Capabilities | Delivery / TTPs | Affected Platforms / Notes |
| WeepSteel | Reconnaissance, system/process/network enumeration, data exfil | Hides exfiltration in ViewState responses; observed alongside Earthworm/Dwagent | Sitecore campaigns targeting ASP.NET environments |
| npm Web3 interceptor | Browser-side crypto wallet monitoring and transaction redirection | JS injected into package index.js | Web applications using compromised npm bundles |
For Technical Audiences (Security, IT, DevOps) – Immediate (24–48h):
Strategic (2–6 weeks):
For Non-Technical Audiences (Leadership & Staff):
IX. Analyst Notes
X. Threat Indicator Appendix (IoCs)
| Type | Indicator | Context | Action |
| Domain | bold-dhawan.45-139-104-115.plesk.page | GhostAction exfil endpoint | Block/monitor; hunt for POSTs; rotate exposed secrets |
| IP | 45.139.104.115 | GhostAction host | Block egress; check historical connections |
| URL | https://npmjs.help (look-alike) | Maintainer-phishing domain | Block at DNS/mail; warn dev teams |
| URL | https://websocket-api2.publicvm.com/images/jpg-to-png.php?name=* | Credential exfil path | Block FQDN/path; proxy alerting |
Note: Validate IoCs in a staging environment before broad enforcement to avoid false positives.
X. Contact Information
Meraal Cyber Security (MCS) – Threat Intelligence Team
Note on Sources & Intelligence:
This report synthesizes data from CISA, MS-ISAC, MITRE, law enforcement press releases, leading cybersecurity vendors, and internal MCS analysis. Confirmed intelligence is separated from unverified speculation to maintain accuracy and credibility.