Nation-state actors dominated this week’s incident landscape, and they’re operating at every layer of the stack. PRC-linked groups are sitting inside VMware infrastructure for 17 months while simultaneously weaponizing a React zero-day within hours of disclosure. DPRK operators are running ransomware through criminal affiliates and draining cryptocurrency exchanges to fund weapons programs. Meanwhile, two separate MSP compromises cascaded into dozens of victim organizations—one hitting UK local government, the other taking down 28 South Korean financial firms in a single campaign.

This week: five incidents that show how nation-states and supply chain attacks are converging, why your patch windows have collapsed from days to hours, and what it looks like when adversaries compromise the infrastructure layer instead of endpoints.

BRICKSTORM: Chinese Threat Actors Compromise VMware Infrastructure for 17 Months

What happened:

CISA, NSA, and the Canadian Cyber Centre released a joint advisory on December 4 warning of ongoing intrusions by PRC state-sponsored actors using BRICKSTORM, a sophisticated Go-based backdoor targeting VMware vSphere environments. In one confirmed incident, attackers maintained persistent access from April 2024 through September 2025—17 months—compromising domain controllers, ADFS servers, and vCenter infrastructure across government and IT sector organizations.

The attackers initially compromised a web server in the victim’s DMZ, then moved laterally to internal systems. They successfully compromised an ADFS server and exported cryptographic keys, harvested MSP credentials from a domain controller, and used those credentials to pivot to VMware vCenter. From vCenter, they deployed BRICKSTORM and created hidden “rogue” VMs operating invisibly alongside legitimate workloads. CrowdStrike attributed recent intrusions to a newly identified China-nexus group called “Warp Panda,” which has targeted legal, technology, and manufacturing entities throughout 2025.

Technical details that matter:
Why you should care:

This is infrastructure compromise at the hypervisor layer. If your VMware environment is compromised, the attacker can see everything running on it—every VM, every snapshot, every credential that passes through. The 17-month dwell time demonstrates these actors are playing long games, positioning for sustained intelligence collection or potential disruption.

The MSP credential theft component means one compromise can cascade across trust boundaries into multiple organizations. The ADFS key export enables authentication token forgery; attackers can impersonate any user without triggering password-based detections. For any organization running VMware vCenter, this advisory should trigger immediate hunting using CISA’s published YARA and Sigma rules. The question isn’t whether you’re a target; it’s whether you’d detect this level of sophistication if it was already in your environment.

Key sources:

React2Shell (CVE-2025-55182): CVSS 10.0 RCE Exploited by Nation-States Within Hours

What happened:

A critical remote code execution vulnerability in React Server Components was disclosed on December 3, affecting React 19.x, Next.js 15.x/16.x, React Router, Waku, and other RSC-enabled frameworks. The vulnerability (CVE-2025-55182) received a CVSS 10.0 score: the maximum severity rating. Unsafe deserialization in the Flight protocol allows unauthenticated attackers to execute arbitrary code on servers processing RSC requests.

Within hours of public disclosure, China-nexus threat groups began active exploitation. AWS Security reported observing systematic debugging and troubleshooting by threat actors (Earth Lamia, Jackpot Panda) on December 4, indicating weaponization was already mature. The attack surface is massive: React powers approximately 40% of web development, and Next.js alone has 18-20% market share among React users. Vercel, Cloudflare, and major CDN providers pushed emergency mitigations, but self-hosted applications remain exposed until patched.

Technical details that matter:
Why you should care:

If you have any web applications built on React 19 or Next.js 15/16 with Server Components enabled, you’re exposed right now. This includes customer-facing applications, internal tools, and third-party SaaS products you depend on. The speed of nation-state exploitation means your security team needs to be inventorying RSC usage and prioritizing patches today, not next sprint.

The combination of unauthenticated access, server-side execution, and massive attack surface makes this one of the most significant web application vulnerabilities of the year. Even if your own applications are patched, your SaaS vendors and partners may still be vulnerable. Ask your vendors directly about their React/Next.js exposure and patch status.

Key sources:

London Borough Councils: Supply Chain Ransomware via Shared IT Services

What happened:

Three London borough councils—Kensington & Chelsea, Westminster, and Hammersmith & Fulham—confirmed on December 1 that they were hit by ransomware through their shared IT services provider in late November. The attack affected services for approximately 550,000 residents across the three boroughs. Data was exfiltrated before encryption, and full recovery is expected to take weeks.

The councils share IT infrastructure and services through a joint arrangement, which created a single point of failure. Once attackers compromised the shared provider, they gained access to all three councils’ environments through trusted management connections. The specific ransomware variant and threat actor have not been publicly attributed, but the attack follows the established MSP compromise playbook seen in Kaseya, SolarWinds, and dozens of similar incidents.

Technical details that matter:
Why you should care:

Shared services and managed service providers are force multipliers for attackers. One compromise equals multiple victims, and the trusted relationships that make shared services efficient are exactly what attackers exploit. This pattern is particularly relevant for government agencies, healthcare systems, and utilities that increasingly rely on shared IT infrastructure for cost efficiency.

The question isn’t whether your MSP is a target (they are), it’s whether you’ve assessed the risk of your MSP being compromised and what your detection and response capabilities look like for that scenario. Can you detect malicious activity coming through legitimate management channels? Do you have independent backups your MSP can’t access? Have you tested your ability to operate without your MSP during an incident?

Key sources:

Korean Leaks: Qilin Ransomware Compromises MSP, Hits 28 Financial Firms

What happened:

Bitdefender disclosed on November 26 that a single managed service provider compromise led to ransomware attacks against 28 South Korean financial services firms. The Qilin ransomware group, operating under the “Korean Leaks” branding, exfiltrated over 2TB of data (more than 1 million files) across three attack waves between September and October 2025. The MSP, GJTec, provided IT services to asset management companies and investment firms across South Korea.

Security researchers identified potential involvement of Moonstone Sleet, a DPRK-linked threat actor, operating as a Qilin affiliate. This represents a significant convergence: nation-state actors using ransomware-as-a-service infrastructure for financial gain while maintaining plausible deniability. The affected firms manage significant assets, and the stolen data includes client information, trading strategies, and internal communications.

Technical details that matter:
Why you should care:

This attack demonstrates two converging threats: supply chain concentration risk and nation-state/criminal convergence. Financial services firms thought they were managing their own security, but their shared MSP created correlated exposure across the entire client base. When your IT provider is compromised, your perimeter security is irrelevant.

The potential DPRK involvement adds another dimension. Nation-state actors using criminal RaaS infrastructure get deniability and revenue, while ransomware operators get sophisticated tradecraft and persistent access capabilities. For financial institutions, this means threat models need to account for adversaries with both nation-state resources and criminal profit motives. Third-party risk assessments need to explicitly address MSP compromise scenarios, and detection capabilities need to identify lateral movement from trusted management interfaces.

Key sources:

Upbit Exchange Hack: Lazarus Group Steals $34 Million

What happened:

On November 27, Upbit, South Korea’s largest cryptocurrency exchange by volume, disclosed a theft of approximately $34 million (50 billion won) in cryptocurrency. South Korean authorities, including the National Intelligence Service, attributed the attack to the DPRK’s Lazarus Group within days of the incident. This marks one of the fastest official nation-state attributions for a financial cyberattack.

Attackers compromised administrator credentials and accessed hot wallet management systems, draining funds before the theft was detected. The stolen cryptocurrency was rapidly moved through a series of wallet transfers and mixing services to obscure its origin. Lazarus Group has stolen over $3 billion from financial institutions over the past five years, with cryptocurrency exchanges being a primary target since 2017.

Technical details that matter:
Why you should care:

Lazarus isn’t just a cryptocurrency threat. The credential abuse, administrator impersonation, and rapid lateral movement TTPs translate directly to traditional financial institutions. The group has previously targeted SWIFT systems, central banks, and payment processors. The cryptocurrency attacks are practice runs and funding sources for broader financial sector operations.

For any financial institution, Lazarus represents a persistent, well-resourced threat that will probe for weaknesses in privileged access management, MFA implementation, and transaction monitoring. The speed of this operation (compromise to extraction to laundering in hours) means detection and response windows are extremely tight. If your transaction monitoring can’t identify anomalous administrative behavior in near-real-time, you won’t catch this until the money is gone.

Key sources:

The Pattern this Week

Nation-states aren’t waiting for you to patch anymore. They’re exploiting critical vulnerabilities within hours of disclosure while simultaneously maintaining 17-month footholds in your infrastructure. This week shows adversaries operating at both ends of the time spectrum: racing to weaponize React2Shell before defenders can respond, while BRICKSTORM actors patiently harvest credentials and forge authentication tokens from inside VMware environments. The common thread isn’t speed or stealth; it’s infrastructure-layer targeting. Hypervisors, server-side frameworks, managed service providers: attackers are compromising the platforms everything else runs on, not the endpoints sitting on top. When your MSP is the attack vector, your perimeter is irrelevant. The defender’s dilemma: you need to respond in hours to zero-days while hunting for adversaries who’ve been inside for months.

See you next week.

Final CTA Section
GET STARTED

Ready to Strengthen Your Defenses?

Whether you need to test your security posture, respond to an active incident, or prepare your team for the worst: we’re ready to help.

📍 Based in Atlanta | Serving Nationwide

Discover more from Satine Technologies

Subscribe now to keep reading and get access to the full archive.

Continue reading