The CISA, FBI, and NSA have released a joint cybersecurity advisory (CSA) detailing a widespread cyber-espionage campaign attributed to a North Korean state-sponsored Advanced Persistent Threat (APT) group named SandViper. This campaign is specifically targeting organizations within the U.S. Defense Industrial Base (DIB) sector. The primary goal is the theft of sensitive intellectual property, including military technology, aerospace designs, and naval system data. The threat actors are using a combination of spear-phishing and exploitation of CVE-2025-41890 for initial access, followed by the deployment of a custom malware toolkit that includes the DuneDrifter backdoor and the SandHauler data exfiltration tool. CISA has added the CVE to its KEV catalog and provided IOCs to help DIB organizations hunt for this threat.
The SandViper campaign demonstrates a patient and targeted approach. The attack lifecycle includes:
T1589.002 - Reconnaissance: Email Addresses: Gathering target emails for the spear-phishing phase.T1566.001 - Phishing: Spearphishing Attachment: A primary initial access vector.T1190 - Exploit Public-Facing Application: Exploiting CVE-2025-41890 in VPN appliances.T1059.003 - Command and Scripting Interpreter: Windows Command Shell: Used by the DuneDrifter backdoor to execute arbitrary commands.T1573.002 - Encrypted Channel: Asymmetric Cryptography: (Assumed) C2 communications for DuneDrifter are likely encrypted.T1041 - Exfiltration Over C2 Channel: The SandHauler tool exfiltrates stolen data through the established C2 channel.A successful breach by SandViper could result in catastrophic damage to U.S. national security. The theft of advanced military designs, weapon system specifications, and other sensitive data could erode the technological advantage of the U.S. military and its allies. For the compromised DIB companies, the impact includes loss of valuable intellectual property, significant financial costs for incident response, loss of government contracts, and severe reputational damage.
The CISA advisory includes a comprehensive list of Indicators of Compromise. While not listed here, they include file hashes for DuneDrifter and SandHauler, as well as domains and IP addresses associated with the SandViper C2 infrastructure. Organizations are urged to ingest these IOCs into their security tools.
D3-NTA: Network Traffic Analysis to monitor for C2 communications and D3-FA: File Analysis on endpoints to detect the custom malware.Immediately apply patches for CVE-2025-41890 on all internet-facing VPN devices.
Mapped D3FEND Techniques:
Conduct regular, targeted phishing awareness training for all employees, especially those in sensitive roles.
Segment networks to prevent adversaries from moving from compromised IT systems to sensitive R&D or operational technology networks.
Mapped D3FEND Techniques:
Implement strict egress filtering to block C2 traffic. Deny all outbound traffic by default and only allow what is explicitly required for business operations.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats