Categories: Cyber Security News

Hackers Exploit WSUS Vulnerability to Steal Sensitive Organizational Data

Security researchers at Sophos have uncovered active exploitation of a critical vulnerability in Windows Server Update Services (WSUS) that enables threat actors to harvest sensitive organizational data without requiring authentication.

The flaw has emerged as a significant threat to enterprise networks, with attackers demonstrating rapid mobilization following the public disclosure of technical details.

Critical Vulnerability Draws Immediate Attention

The remote code execution vulnerability, designated as CVE-2025-59287, has attracted widespread exploitation attempts since Microsoft released security patches on October 14, 2025, with an additional emergency out-of-band update following on October 23.

The situation escalated dramatically when proof-of-concept code appeared on GitHub, triggering a wave of coordinated attacks against internet-facing WSUS servers within hours of the technical analysis becoming publicly available.

Sophos Counter Threat Unit researchers detected the first active exploitation on October 24, 2025, at 02:53 UTC, marking the beginning of systematic attacks targeting organizations across technology, healthcare, manufacturing, and educational sectors.

The exploitation campaign primarily affected organizations based in the United States, with preliminary analysis suggesting approximately 50 victims may have been compromised, though Sophos confirmed at least six incidents across their customer environments.

The exploitation technique observed by security researchers demonstrates advanced capabilities leveraging a deserialization bug within WSUS.

Threat actors execute Base64-encoded PowerShell commands through nested cmd.exe processes that run within IIS worker processes, establishing a foothold for data collection activities.

Once successfully deployed, the malicious PowerShell script systematically extracts critical organizational information, including external IP addresses and port configurations, comprehensive lists of Active Directory domain users, and detailed network interface configurations.

The harvested data is subsequently exfiltrated to an external webhook.site URLs controlled by the attackers, with the script automatically defaulting to native curl commands when initial upload attempts fail, ensuring successful data theft regardless of connectivity challenges.

Analysis of a publicly accessible webhook.site URLs revealed sensitive information dumps containing domain user details and network configurations from multiple organizations, including universities, technology companies, manufacturing firms, and healthcare providers.

The attackers’ decision to utilize free webhook.site services with visible request histories inadvertently allowed researchers to document the full extent of exploitation activity.

Between 02:53 UTC and 11:32 UTC on October 24, threat actors reached the maximum 100-request limit on available webhook URLs, demonstrating the intensive reconnaissance activity targeting vulnerable systems.

This concentrated timeframe highlights the coordinated nature of the exploitation campaign.

Security experts, alongside government agencies including CISA and NSA, are urging organizations to implement immediate protective measures.

Critical actions include applying available patches to all WSUS installations, identifying internet-exposed WSUS servers, and restricting access to WSUS ports 8530 and 8531 through network segmentation and firewall policies.

Organizations should also conduct thorough reviews of system logs for indicators of scanning and exploitation attempts.

The rapid exploitation of CVE-2025-59287 underscores the critical importance of timely patching and robust network segmentation in maintaining organizational security postures against increasingly sophisticated threat actors.

CVE ID Affected Product Vulnerability Type CVSS 3.1 Score Attack Vector Authentication Required Impact
CVE-2025-59287 Windows Server Update Services (WSUS) Remote Code Execution / Deserialization Not Available Network None Critical – Enables unauthorized data exfiltration, Active Directory enumeration, and network reconnaissance

Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

The post Hackers Exploit WSUS Vulnerability to Steal Sensitive Organizational Data appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Tiny homes, yurts explored by lawmakers as potential housing tool

Johanna Richardson tugged on her purple felted vest as she spoke. The handmade item is…

7 minutes ago

Bill relaxing zoning requirements on child care centers receives bipartisan support as ‘important piece of the solution’

Jennifer Legere considered herself an expert in zoning requirements, fire codes and site plan reviews.…

7 minutes ago

In court, Logan Clegg’s lawyers call Concord police’s warrantless cellphone ping ‘constitutional violation’

Marc McGonagle, a former lieutenant with the Concord Police Department, took about 30 minutes to…

7 minutes ago

Concord selects two finalists for high school principal position

A search committee has selected a pair of finalists for Concord High School’s open principal…

8 minutes ago

Pennsylvania Commonwealth Court Overturns Ban on Medicaid Coverage for Abortions

Women’s reproductive rights – and abortion access – won big Monday in Pennsylvania’s Commonwealth Court.…

3 hours ago

Freeport sewer system overwhelmed with foreign materials

FREEPORT, Ill. (WTVO) — Recent heavy rainfall is only making issues worse in the city…

3 hours ago

This website uses cookies.