CISA Warns of North Korean "SandViper" APT Espionage Campaign Targeting US Defense Sector

CISA, FBI, and NSA Expose "SandViper" APT Campaign Targeting U.S. Defense Industrial Base with Custom Malware

HIGH
February 23, 2026
4m read
Threat ActorCyberattackThreat Intelligence

Related Entities

Threat Actors

SandViper

Organizations

Other

DuneDrifterSandHaulerNorth Korea

CVE Identifiers

CVE-2025-41890
HIGH
CVSS:8.6

Full Report

Executive Summary

The CISA, FBI, and NSA have released a joint cybersecurity advisory (CSA) detailing a widespread cyber-espionage campaign attributed to a North Korean state-sponsored Advanced Persistent Threat (APT) group named SandViper. This campaign is specifically targeting organizations within the U.S. Defense Industrial Base (DIB) sector. The primary goal is the theft of sensitive intellectual property, including military technology, aerospace designs, and naval system data. The threat actors are using a combination of spear-phishing and exploitation of CVE-2025-41890 for initial access, followed by the deployment of a custom malware toolkit that includes the DuneDrifter backdoor and the SandHauler data exfiltration tool. CISA has added the CVE to its KEV catalog and provided IOCs to help DIB organizations hunt for this threat.

Threat Overview

  • Threat Actor: SandViper (Attributed to North Korea)
  • Target: U.S. Defense Industrial Base (DIB) sector, including aerospace and naval contractors.
  • Objective: Cyber-espionage and theft of sensitive national security information.
  • Initial Access Vectors:
    1. Highly targeted spear-phishing emails.
    2. Exploitation of a recently patched VPN vulnerability, CVE-2025-41890.
  • Malware Toolkit:
    • DuneDrifter: A custom, modular backdoor for persistence, command execution, and payload delivery.
    • SandHauler: A specialized tool designed to search for, compress, and exfiltrate files matching specific defense-related keywords.

Technical Analysis

The SandViper campaign demonstrates a patient and targeted approach. The attack lifecycle includes:

  1. Reconnaissance: The actors identify key personnel and systems within DIB organizations.
  2. Initial Access: They gain a foothold through either tricking a user via a spear-phishing email or by exploiting CVE-2025-41890 on an external-facing corporate VPN appliance.
  3. Persistence & C2: The DuneDrifter backdoor is installed to ensure persistent access and establish a command-and-control channel to the actor's infrastructure.
  4. Discovery & Data Staging: Using DuneDrifter, the attackers explore the compromised network, identify valuable data repositories, and use the SandHauler tool to collect and stage sensitive documents.
  5. Exfiltration: The staged data is compressed and exfiltrated over the C2 channel or other covert means.

MITRE ATT&CK TTPs

Impact Assessment

A successful breach by SandViper could result in catastrophic damage to U.S. national security. The theft of advanced military designs, weapon system specifications, and other sensitive data could erode the technological advantage of the U.S. military and its allies. For the compromised DIB companies, the impact includes loss of valuable intellectual property, significant financial costs for incident response, loss of government contracts, and severe reputational damage.

IOCs

The CISA advisory includes a comprehensive list of Indicators of Compromise. While not listed here, they include file hashes for DuneDrifter and SandHauler, as well as domains and IP addresses associated with the SandViper C2 infrastructure. Organizations are urged to ingest these IOCs into their security tools.

Detection & Response

  • Ingest IOCs: Immediately import all IOCs from the CISA advisory into SIEM, EDR, and network security platforms to search for historical and current activity.
  • Hunt for VPN Exploitation: Analyze VPN logs for any signs of exploitation related to CVE-2025-41890. Look for anomalous source IPs or unusual activity from authenticated VPN sessions.
  • Email Log Analysis: Scrutinize email logs for messages from the domains listed in the CISA IOCs. Isolate and analyze any suspicious attachments.
  • Endpoint Analysis: Use EDR to hunt for the file hashes and process behaviors associated with DuneDrifter and SandHauler.
  • D3FEND: Implement D3-NTA: Network Traffic Analysis to monitor for C2 communications and D3-FA: File Analysis on endpoints to detect the custom malware.

Mitigation

  1. Patch CVE-2025-41890: Prioritize patching all vulnerable VPN appliances immediately. This closes one of the primary entry vectors.
  2. Enhance Email Security: Configure email gateways to block emails with malicious indicators and train users to identify and report sophisticated spear-phishing attempts.
  3. Network Segmentation: Implement strict network segmentation to limit an attacker's ability to move laterally from a less-sensitive system to a high-value data repository.
  4. Restrict Outbound Traffic: Apply egress filtering to block outbound connections from servers to all but explicitly required destinations, disrupting C2 channels.
  5. Application Allowlisting: Use application control solutions to prevent the execution of unauthorized software like the DuneDrifter backdoor.

Timeline of Events

1
February 23, 2026
CISA, the FBI, and the NSA issue a joint cybersecurity advisory on the SandViper APT campaign.
2
February 23, 2026
This article was published

MITRE ATT&CK Mitigations

Immediately apply patches for CVE-2025-41890 on all internet-facing VPN devices.

Mapped D3FEND Techniques:

Conduct regular, targeted phishing awareness training for all employees, especially those in sensitive roles.

Segment networks to prevent adversaries from moving from compromised IT systems to sensitive R&D or operational technology networks.

Mapped D3FEND Techniques:

Implement strict egress filtering to block C2 traffic. Deny all outbound traffic by default and only allow what is explicitly required for business operations.

Mapped D3FEND Techniques:

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

APTSandViperCISACyber-espionageDefense Industrial BaseDIBNorth Korea

📢 Share This Article

Help others stay informed about cybersecurity threats