China-Linked Threat Actors Exploit Sitecore Zero-Day for Enterprise Network Access

Related

Lotus Blossom Hackers Compromised Notepad++ Hosting Infrastructure to Deliver Malware

What happened The state-sponsored threat group Lotus Blossom breached the...

Lithuania Launches National Initiative to Counter AI-Driven Cyber Fraud

What happened Lithuania has launched a government-funded national initiative aimed...

ClickFix Attack Abuses nslookup to Deliver PowerShell Malware via DNS

What happened Threat actors have introduced a new ClickFix attack...

Snail Mail Phishing Campaign Targets Trezor and Ledger Crypto Wallet Users

What happened Threat actors have launched a phishing campaign using...

Share

What happened

China-linked threat actors exploited a Sitecore zero-day for enterprise network access in attacks observed in 2025–2026. The attackers targeted Sitecore Experience Platform using CVE-2025-53690, a ViewState deserialization flaw, to gain initial access without credentials. Cisco Talos researchers report that the threat actor, tracked as UAT-8837, used hands-on-keyboard techniques and living-off-the-land tools, including GoTokenTheft, Rubeus, Certipy, SharpHound, and Earthworm, to collect Active Directory credentials, enumerate users and service accounts, and establish persistence. Mandiant researchers previously observed the zero-day in attacks deploying the reconnaissance backdoor “WeepSteel.” UAT-8837 also performed host and network reconnaissance, disabled RDP RestrictedAdmin, and exfiltrated DLLs for potential future trojanization and supply-chain attacks.

Who is affected

Organizations running internet-facing Sitecore Experience Platform deployments are directly affected. Enterprises relying on Sitecore for public-facing websites face potential indirect exposure if compromised systems allowed lateral movement or credential theft.

Why CISOs should care

Zero-day exploitation of enterprise CMS platforms bypasses traditional perimeter controls, enabling attackers to harvest credentials, map AD infrastructure, and establish persistent footholds that threaten sensitive data and long-term operational security.

3 practical actions

  • Patch and mitigate immediately: Apply vendor updates and recommended mitigations for Sitecore Experience Platform.
  • Restrict access to management interfaces: Limit internet-facing exposure and segment Sitecore servers from internal networks.
  • Hunt for post-exploitation activity: Audit endpoints and logs for web shells, unusual command execution, and lateral movement indicators.