Critical Infrastructure Under Siege: Notable Cyber Attacks and Threats on August 2, 2025

Today saw the exposure of a sweeping SAP exploit by China-linked groups affecting hundreds of global critical systems, while ransomware and supply-chain breaches continue to threaten defense and finance sectors.

Critical Infrastructure Under Siege: Notable Cyber Attacks and Threats on August 2, 2025

Published: August 2, 2025

Key Cyber Incidents Today

  • Sanctioned SadDrop Attack: China-linked groups exploit SAP NetWever (CVE-2025-31324), infiltrating 581 critical systems globally across gas, water, medical manufacturing, and public sectors. Dutch researchers attributed the attacks to UNC5221, UNC5274, and CL-STA-0048, reporting widespread impact and linked their teaming to chemal-based remote code execution. The penin was mobilization, making soleng servers particularly vulnerable in the exploit chain, posing long-term risk to critical infrastructure and operations. More details

  • Defense Contractor Breach and Industrial Supply-Chain Risk: The Interlock Ransomware Group targeted National Defense Corporation and subsidiary AMTEC in a major attack. Avalanched persistence of shunning basic compliance is highlighted by the leaked wholesale of over 4.2 terabytes of data, including logistics and procurement defense data that reveal vital supply-chain and procurement weaknesses. Following-up legal, social, and regulatory exposure is anticipated. Read more

  • Supply Chain Attack Vulnerability: Sequel large data breaches highlight continuing risk from third-and network vendor weakness.

Major Takeaways & Observations this Week

  • Defense, finance, and critical infrastructure remain in the danger from SAP? network exploits (CVE-2025-31324) and recent waves of supply-chlain based breaching attacks.
  • Qualified supply-chain resilience is under test.
  • Attackers use exploits of chain - unauthorized lateral access rivals all sectors.
  • Recommended timely patching and real-time monitoring frameworks across enterprises.”

I just do cybersecurity stuff.

Discussion

Leave a Comment

Guest comments will be reviewed before appearing on the site.

No comments yet. Be the first to start the discussion!

Suggestions or Report a bug? Contact us!