Cyber Intelligence Weekly

Cyber Intelligence Weekly (August 24, 2025): Our Take on Three Things You Need to Know

Welcome to our weekly newsletter where we share some of the major developments on the future of cybersecurity that you need to know about. Make sure to follow my LinkedIn page as well as Echelon’s LinkedIn page to receive updates on the future of cybersecurity!

To receive these and other curated updates to your inbox on a regular basis, please sign up for our email list here: https://echeloncyber.com/ciw-subscribe

Before we get started on this week’s CIW, I’d like to highlight how Echelon helped the Detroit Pistons up their cybersecurity game!

Echelon worked with the Detroit Pistons to identify vulnerabilities, strengthen incident response, and keep operations ready on and off the court.

🔗 See how they raised their cybersecurity game: https://lnkd.in/ehpZvTD2

Away we go!

1.  Nearly Every Fortune 500 Firm May Have Unknowingly Hired North Korean IT Workers

North Korea’s remote-work hustle has gone fully industrial. Investigators and incident responders say the regime has built a globe-spanning pipeline that places covert IT contractors—often using stolen or fabricated U.S. identities—inside Western companies, including a staggering share of the Fortune 500. The aim is twofold: steady revenue that evades sanctions and access to proprietary data. The playbook is mature: polished résumés and LinkedIn profiles (frequently AI-assisted), professional interviewers with fluent English, and a relay of operators who take over once the offer letter lands.

Behind the scenes sits a corporate-style apparatus. Recruits trained at elite Pyongyang universities rotate through roles across China-based fronts and U.S. “laptop farms” run by willing facilitators who accept shipped devices, install remote-access tools, and keep the hardware online. Security teams are seeing overlaps with known DPRK clusters—Lazarus and others—plus subgroups experimenting with Rust backdoors, PubNub-based C2, and now even ransomware in select cases. Scale indicators are sobering: large enterprises report torrents of suspicious applications within hours of posting a job; CrowdStrike alone has worked hundreds of cases where North Korean operatives landed developer roles.

Why companies miss it: the signals are scattered. HR notices recycled references and identical phone numbers; IT flags odd browser fingerprints and remote-access software; finance sees payroll routed through new “consultancies.” Rarely do those dots get connected quickly, and when they do, managers are reluctant to part with high-performing contributors. Some impostors retaliate—exfiltrating source code, threatening leaks, or filing spurious HR complaints—while the network expands into Europe as U.S. firms tighten checks.

What security leaders should do now: treat talent acquisition as a sanctioned-actor attack surface. Require strong identity proofing (live video + liveness + government ID verification), bind access to enrolled, attested devices, and geofence admin actions. Ship laptops only to verified corporate addresses; forbid unmanaged RMM; monitor for “laptop farm” patterns (multiple corp devices beaconing from one residential ISP). Centralize hiring, IT, and SOC signals; enforce phishing-resistant MFA; scrutinize contractors and staffing firms; and run sanctions screening on payees. Finally, limit data by role, log everything, and be ready to offboard fast—with preserved evidence and a containment playbook.

MITRE ATT&CK for Cloud: Visibility into Adversary Behaviors in Cloud Environment

Many organizations are early in their journey into operationalizing MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) and MITRE continues to expand its capabilities by providing a robust library of detailed ATT&CK matrices including a general cloud matrix. This matrix was created as MITRE identified a problem where many organizations have a lack of visibility into attacker behaviors and common tactics, techniques, and procedures (TTPs) user to target organizations cloud assets resulting in organizations being exposed to emergin threats. To assist with combating this problem, MITRE created specialized matrices for infrastructure as a service (IaaS), software as a service (SaaS), Cloud-based Office Suites (such as Microsoft365 and Google Workspace), and Identity as a Service (IDaaS such as Microsoft Entra ID and Okta).  Each of these specialized matrices provides an effective method of tracking specific threat actor TTPs relevant platforms or services and effective methods to log and alert on the identified TTPs via recommended data sources and mitigations. Benefits from using the MITRE CLOUD ATT&CK matrix are:

· Threat Awareness: Provides a comprehensive view of potential cloud-specific attack techniques, helping organizations understand the threats they face.

· Risk Management: Enables organizations to assess their risk exposure in cloud environments and prioritize security efforts accordingly.

· Security Strategy: Aids in the development of effective security strategies and incident response plans tailored to cloud platforms.

· Tool Selection: Assists in the selection of appropriate security tools and solutions to counter the identified threats effectively.

· Research and Collaboration: Supports security researchers and practitioners in sharing knowledge, findings, and best practices.

MITRE continues to improve the detailed matrices with recent updates including aligning cloud data sources to the Enterprises ATT&CK matrix to provide a more cohesive view into capabilities across all layers of an enterprise, expanded and updated cloud technique coverage, and more comprehensive tracking of active cloud-specific threat actor campaigns. It's never too late to increase your own understanding of threats facing your organization and defensive capabilities to combat these threats, specialized ATT&CK frameworks help to operationalize this approach for your cloud estate.

2.  Apple Rushes Zero-Day Fix Flagged by CISA

Apple has shipped emergency patches across its platforms after U.S. cyber officials warned that a newly discovered zero-day is being actively exploited. The flaw, tracked as CVE-2025-6558, affects WebKit—the browser engine underpinning Safari—and can be triggered by booby-trapped web content to achieve code execution and potentially break out of the browser sandbox. CISA added the bug to its Known Exploited Vulnerabilities catalog and told federal agencies to update fast, underscoring the risk to iPhones, iPads, and Macs that haven’t moved to Apple’s latest releases (including iOS/iPadOS 18.6 and macOS Sequoia 15.6).

Google’s Threat Analysis Group first flagged in-the-wild use of the issue earlier this summer; Apple’s fixes land as part of a broader security push that also closes additional WebKit holes. While technical details are sparse (as is customary during active exploitation), the working theory is that attackers are luring targets to malicious pages or drive-by download chains—an attack pattern we’ve seen repeatedly against both government and enterprise users. CISA’s KEV listing means this isn’t theoretical; exploitation is happening now.

For defenders, the playbook is equal parts speed and hygiene: inventory your Apple fleet, enforce rapid updates via MDM, and verify that managed browsers are receiving the patched WebKit components. Watch for anomalous browser crashes, new persistence after a browser event, and suspicious outbound traffic following page loads. If your environment includes high-risk users—legal, executive, or research staff—consider temporary hardening: disable unmanaged extensions, restrict non-approved browsers, and increase inspection on web traffic until you’ve closed the patch gap. CISA’s inclusion of CVE-2025-6558 in KEV is the signal to treat this as a priority patch, not a routine Tuesday.

Organizations outside the federal orbit shouldn’t shrug this off. The same exploit chains that work against agencies get repurposed quickly for credential theft, session hijacking, and initial access across the private sector. The cost of waiting is almost always higher than the friction of emergency patching—especially on devices that frequently leave your perimeter.

AI in the SOC: Unpacking Hidden Vulnerabilities and the Promise of Adaptive Solutions

While artificial intelligence is increasingly embraced by Security Operations Centers (SOCs) to manage the overwhelming volume of security alerts, a closer examination reveals that many current AI tools possess significant and often hidden weaknesses. A primary limitation stems from their reliance on pre-trained, static AI models. These models, designed to address specific, predefined security use cases, can be highly effective for managing known, high-volume alert categories. However, their rigidity becomes a critical vulnerability when confronted with the dynamic and ever-evolving threat landscape. They struggle to keep pace with novel attack techniques, emerging malware, and sophisticated adversary tactics. This inherent inflexibility creates critical blind spots, leading to inconsistent triage quality, a high rate of false positives or negatives, and, crucially, an increased manual burden on SOC analysts who must compensate for the AI's deficiencies. This often results in alerts being missed or delayed, significantly impacting response times and overall security posture.

A more robust and resilient solution lies in the adoption of adaptive AI models. Unlike their pre-trained counterparts, adaptive AI systems are engineered to handle completely novel and unfamiliar alerts by performing real-time research and in-depth analysis. This capability is powered by a sophisticated, coordinated network of specialized AI agents. For instance, dedicated research agents are designed to autonomously gather and synthesize information from diverse sources, including threat intelligence, historical incident data, and external knowledge bases. Concurrently, triage agents dynamically construct and execute incident response procedures based on this newly acquired understanding.

A key architectural benefit of adaptive AI platforms is their ability to seamlessly integrate and leverage multiple large language models (LLMs). This multi-LLM approach is crucial because each LLM can be optimized for distinct analytical tasks, from understanding nuanced natural language descriptions of threats to identifying complex patterns in log data. This leads to a marked improvement in the accuracy, efficiency, and overall robustness of alert triage. The business advantages are substantial, encompassing accelerated time-to-value for new deployments, comprehensive alert coverage that minimizes blind spots, and a significant reduction in the cognitive load and manual workload for SOC analysts, allowing them to focus on strategic threat hunting and complex investigations. Furthermore, truly effective AI SOC platforms integrate response automation and robust built-in log management, providing end-to-end efficiency and productivity that enables organizations to move beyond the traditional limitations and escalating costs associated with legacy Security Information and Event Management (SIEM) solutions.

3.  Workday Breach Highlights OAuth Risks in Salesforce Ecosystems

Workday says a recent social-engineering campaign against large enterprises spilled some data from a third-party CRM environment—widely understood to be Salesforce—without touching customer tenants. The HR giant disclosed that threat actors accessed “commonly available business contact information” (names, emails, phone numbers) after compromising the CRM on August 6 and that the same crew has been texting and calling employees while posing as HR or IT to elicit credentials or access. While the company stresses that core tenant data was not affected, contact records are exactly what adversaries need to scale targeted follow-on scams.

This incident tracks with a broader spree tied to the ShinyHunters extortion group, which has been convincing users to grant a malicious OAuth app access to corporate Salesforce instances. Once the rogue app is approved, attackers can quietly pull large datasets via API and then attempt email-based extortion. In recent months, multiple global brands have reported similar thefts and shakedown attempts using the same OAuth-abuse playbook.

The practical risk here isn’t theoretical. “Just contacts” readily fuels believable phishing, vendor-impersonation, payroll rerouting, and executive-spoofing campaigns against customers, partners, and candidates. For SaaS owners, assume CRM records are crown-jewel adjacent: review and revoke suspicious “Connected Apps,” enable admin-approved/OAuth allow-listing, lock down scopes to least privilege, and turn on anomaly alerts for bulk API pulls. Require phishing-resistant MFA and number-matching, block unmanaged devices, and log to a SIEM or SSPM so OAuth grants, token use, and data-export events are visible and alertable.

For incident readiness, run a quick tabletop around “malicious OAuth consent” and pre-draft comms to warn contacts about impostor outreach. If you’re a Workday customer, treat any unexpected texts or calls referencing HR changes, 2FA resets, or benefits updates as suspect; validate via known channels before engaging.

Thanks for reading!

About us: Echelon is a full-service cybersecurity consultancy that offers wholistic cybersecurity program building through vCISO or more specific solutions like penetration testing, red teaming, security engineering, cybersecurity compliance, and much more! Learn more about Echelon here: https://echeloncyber.com/about

Are you ready to get started?