Cyber Threat Analysis August 18, 2025

Cyber Threat Intel – Monday Briefing

Your weekly intelligence update on top threats, vulnerabilities, and emerging actors.

August 18, 2025

Cybersecurity analyst wearing a headset working at multiple monitors glowing with blue data visuals in a dark operations center.

Executive Summary

Last week’s cyber landscape underscored urgent patching and heightened vigilance for SMBs. Microsoft’s August Patch Tuesday (Aug 12) addressed over 107 vulnerabilities, including a Windows Kerberos zero-day (CVE-2025-53779), with 13 flaws rated Critical—prompting immediate updates to domain controllers and core infrastructure (BleepingComputer, Krebs on Security).

At the same time, a WinRAR zero-day (CVE-2025-8088) came under active exploitation by the RomCom/Storm-0978 threat group in spear-phishing campaigns, pushing malware via weaponized archives; users are urged to update to WinRAR 7.13 without delay (BleepingComputer, The Hacker News, ESET).

Adding to the pressure, active exploitation warnings emerged for both N-able N-central (CVE-2025-8875/8876) and Citrix NetScaler (CVE-2025-6543), with confirmed breaches reported—an especially severe risk to MSPs and the SMBs that depend on them.

Microsoft August Patch Tuesday

Severity – Critical

Potential domain compromise via Kerberos EoP; numerous RCEs across Windows stack. Kerberos zero-day & 13 Critical CVEs

Remediation: Apply August updates now; prioritize DCs.

WinRAR CVE-2025-8088 (active)

Severity – Critical

Path traversal lets archives drop files outside intended folders; used by RomCom to deploy backdoors (SnipBot, RustyClaw, Mythic)

Remediation: Upgrade to 7.13; disable auto-extract; block .rar in

N-able N-central RMM zero-days

Severity – Critical

Active attacks against MSP RMM platforms could cascade to many SMB tenants. Patch immediately

Remediation: audit RMM accounts & tokens; monitor for anomalous push jobs

Vulnerability Spotlight

CVE-2025-53779 — Windows Kerberos Elevation of Privilege (0-day)

Affected Systems: Windows Server / Domain environments (Kerberos)

Details: Publicly disclosed; attackers with specific attribute write access can escalate to Domain Admin. Fixed in Aug 2025 patches.

Action:

  • Patch Domain Controllers immediately

  • Review msds-groupMSAMembership / msds-ManagedAccountPreceededByLink ACLs

  • Monitor for abnormal TGS/TGT activity

Tom's Guide CVE-2025-8088 — WinRAR Path Traversal (active exploit)

Affected Systems: WinRAR < 7.13 on Windows.

Details: Publicly disclosed; attackers with specific attribute write access can escalate to Domain Admin. Fixed in Aug 2025 patches.

Action:

  • Update to 7.13, block inbound .rar attachments, open archives in sandbox/VM, enable application allow-listing

Threat Actor Activity

  • RomCom / Storm-0978 (Russia-linked) leveraging CVE-2025-8088 via phishing themes (job apps, official docs); payloads include SnipBot, RustyClaw, Mythic. Targeting finance, manufacturing, defense, logistics in EU/Canada. BleepingComputereset.com

  • Ransomware landscape:

    • BlackSuit infrastructure dismantled by law enforcement (servers, domains, ~$1M seized); expect rebrand/regroup (reports of Chaos spinoff). AxiosIT Pro

    • Akira activity remains elevated; MSP-focused claims and SonicWall-adjacent intrusion vectors reported. IT ProThe Hacker News

SMB Recommendations

  • Patch with urgency: Deploy Microsoft Aug 2025 updates, prioritizing Domain Controllers; reboot and verify Kerberos. BleepingComputer

  • Eliminate WinRAR exposure: Upgrade to 7.13; temporarily block .rar at email gateway; detonate archives in sandbox before opening. The Hacker News

  • Secure MSP/RMM stack: Patch N-central; enforce MFA, least-privilege for RMM users, and IP-allowlist to management consoles; review automated jobs for tampering. BleepingComputer

  • Harden edge appliances: Patch/mitigate Citrix NetScaler; restrict admin interfaces; enable WAF/geo-blocking where appropriate; inspect for IOCs. BleepingComputer

  • Backups & recovery: Verify offline/immutable backups and test restores; ensure EDR covers servers and RMM endpoints. (General best practice aligned to current ransomware activity.) IT Pro

  • Phishing resilience: Refresh user training; flag archive attachments; disable macros and risky file associations.

About SOClogix

SOClogix specializes in providing cyber threat intelligence, 24/7 monitoring, and managed detection and response (MDR) tailored for SMBs and mid-market organizations. Our mission is to help businesses stay ahead of evolving threats with actionable intel, proactive defense, and rapid incident response. If you have questions about this week’s report—or need support addressing any of the highlighted vulnerabilities—contact the SOClogix team at 443-409-5426 or visit www.soclogix.com/contact-us.

Schedule a threat assessment with our team today!

author avatar
Matt Johnson CEO
Facebook
Twitter
LinkedIn
Pinterest