China-Linked Threat Actors Exploit Sitecore Zero-Day for Enterprise Network Access

Related

In Praise of CISA

Lately, the Cybersecurity and Infrastructure Security Agency (CISA) has...

Cybersecurity Leaders to Watch: Louisiana Healthcare

Louisiana’s healthcare sector depends on cybersecurity leaders who can...

Anthropic Unveils Claude Mythos to Find Critical Software Flaws Before Attackers Do

What happened Anthropic unveiled Claude Mythos Preview as the model...

Microsoft Commits $10 Billion to Expand AI and Cybersecurity Infrastructure in Japan

What happened Microsoft announced a $10 billion investment to expand...

Share

What happened

China-linked threat actors exploited a Sitecore zero-day for enterprise network access in attacks observed in 2025–2026. The attackers targeted Sitecore Experience Platform using CVE-2025-53690, a ViewState deserialization flaw, to gain initial access without credentials. Cisco Talos researchers report that the threat actor, tracked as UAT-8837, used hands-on-keyboard techniques and living-off-the-land tools, including GoTokenTheft, Rubeus, Certipy, SharpHound, and Earthworm, to collect Active Directory credentials, enumerate users and service accounts, and establish persistence. Mandiant researchers previously observed the zero-day in attacks deploying the reconnaissance backdoor “WeepSteel.” UAT-8837 also performed host and network reconnaissance, disabled RDP RestrictedAdmin, and exfiltrated DLLs for potential future trojanization and supply-chain attacks.

Who is affected

Organizations running internet-facing Sitecore Experience Platform deployments are directly affected. Enterprises relying on Sitecore for public-facing websites face potential indirect exposure if compromised systems allowed lateral movement or credential theft.

Why CISOs should care

Zero-day exploitation of enterprise CMS platforms bypasses traditional perimeter controls, enabling attackers to harvest credentials, map AD infrastructure, and establish persistent footholds that threaten sensitive data and long-term operational security.

3 practical actions

  • Patch and mitigate immediately: Apply vendor updates and recommended mitigations for Sitecore Experience Platform.
  • Restrict access to management interfaces: Limit internet-facing exposure and segment Sitecore servers from internal networks.
  • Hunt for post-exploitation activity: Audit endpoints and logs for web shells, unusual command execution, and lateral movement indicators.