Executive Summary
In November 2025, a coordinated wave of cyberattacks exploited zero-day vulnerabilities targeting Fortinet security appliances and Google Chrome, while also abusing software supply chains and SaaS platforms. Attackers employed advanced techniques including lateral movement within trusted environments, the deployment of custom malware like BadIIS, and supply-chain infiltration, allowing them to bypass perimeter defenses and remain undetected across enterprise networks. Major cloud and SaaS providers such as Microsoft, Salesforce, and Google rapidly initiated emergency incident response, mitigating exploit attempts, DDoS attacks, and malicious update channels affecting a wide range of organizations.
This incident marks a sharp escalation in multi-vector threats—combining zero-day exploitation, supply-chain compromise, and SaaS risk. The campaign aligns with the latest tactics of threat actors leveraging trusted software channels and abusing cloud-native tools, underscoring rising regulatory scrutiny and the urgent need for robust zero trust security measures across multi-cloud and SaaS environments.
Why This Matters Now
This multi-pronged breach exposes critical gaps in traditional perimeter and supply chain defenses as attackers pivot to exploiting both infrastructure and SaaS platforms through zero-day vulnerabilities. Rising sophistication and speed of such campaigns highlight the urgent need for organizations to modernize their security strategies, strengthen east-west and SaaS protections, and accelerate adoption of zero trust and threat detection capabilities.
Attack Path Analysis
Attackers exploited 0-day vulnerabilities in Fortinet and Chrome or leveraged compromised SaaS supply chains to gain initial cloud access, possibly through phishing or malicious updates. They escalated privileges by abusing misconfigurations, tokens, or cloud IAM roles to broaden access. Lateral movement was conducted via east-west traffic in multi-cloud or Kubernetes environments, targeting additional workloads or services. Once established, attackers set up command and control channels through covert outbound connections or trusted applications. Sensitive data was exfiltrated using encrypted or unfiltered outbound paths. Finally, attackers inflicted impact through ransomware deployment, SaaS data destruction, or DDoS disruptions, causing business harm.
Kill Chain Progression
Initial Compromise
Description
Attackers exploited unpatched Fortinet or Chrome vulnerabilities, malicious browser alerts, or compromised SaaS supply chains to gain initial access to cloud or hybrid environments.
Related CVEs
CVE-2025-64446
CVSS 9.8A path traversal vulnerability in Fortinet's FortiWeb allows unauthenticated attackers to execute administrative commands via HTTP or HTTPS requests.
Affected Products:
Fortinet FortiWeb – 8.0.0 through 8.0.1, 7.6.0 through 7.6.4, 7.4.0 through 7.4.9, 7.2.0 through 7.2.11, 7.0.0 through 7.0.11
Exploit Status:
exploited in the wildCVE-2025-58034
CVSS 6.7An OS command injection vulnerability in Fortinet's FortiWeb allows authenticated attackers to execute arbitrary code via crafted HTTP requests or CLI commands.
Affected Products:
Fortinet FortiWeb – 8.0.0 through 8.0.1, 7.6.0 through 7.6.5, 7.4.0 through 7.4.10, 7.2.0 through 7.2.11, 7.0.0 through 7.0.11
Exploit Status:
exploited in the wildCVE-2025-13223
CVSS 8.8A type confusion vulnerability in Google Chrome's V8 JavaScript engine allows attackers to execute arbitrary code via crafted HTML pages.
Affected Products:
Google Chrome – Prior to 117.0.5938.132
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
Drive-by Compromise
Command and Scripting Interpreter
System Script Proxy Execution
Valid Accounts
Phishing
Endpoint Denial of Service
Modify Authentication Process
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Security Vulnerabilities Addressed
Control ID: 6.4.3
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Art. 9
CISA ZTMM 2.0 – Strong Authentication and Identity Management
Control ID: Identity Pillar, 1.2
NIS2 Directive – Incident Response and Reporting
Control ID: Article 21(2)d
ISO/IEC 27001:2022 – Secure Development Lifecycle
Control ID: A.8.28
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Information Technology/IT
Critical exposure to Fortinet exploits and Chrome 0-days requiring immediate patch management, enhanced east-west traffic security, and zero trust segmentation controls.
Financial Services
High-value targets for supply chain attacks and SaaS breaches demanding encrypted traffic controls, egress filtering, and threat detection for regulatory compliance.
Computer Software/Engineering
Vulnerable to software update compromises and browser-based attacks necessitating kubernetes security, multicloud visibility, and inline intrusion prevention systems for protection.
Government Administration
Strategic targets for DDoS attacks and fake news campaigns requiring cloud native security fabric, anomaly detection, and secure hybrid connectivity solutions.
Sources
- ⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & Morehttps://thehackernews.com/2025/11/weekly-recap-fortinet-exploit-chrome-0.htmlVerified
- Alert: Active Exploitation of Critical FortiWeb Vulnerability – November 2025https://cyber.gov.rw/updates/article/alert-active-exploitation-of-critical-fortiweb-vulnerability-november-2025/Verified
- Fortinet customers told to update immediately following major security issue - here's what we knowhttps://www.techradar.com/pro/security/fortinet-customers-told-to-update-immediately-following-major-security-issue-heres-what-we-knowVerified
- Fortinet FortiWeb Zero-Day Vulnerability (CVE-2025-58034) Exploited in the Wildhttps://www.esentire.com/security-advisories/fortinet-fortiweb-zero-day-vulnerability-cve-2025-58034-exploited-in-the-wildVerified
- New FortiWeb zero-day CVE-2025-58034 under attack patched by Fortinethttps://securityaffairs.com/184806/hacking/new-fortiweb-zero-day-cve-2025-58034-under-attack-patched-by-fortinet.htmlVerified
- Google Fixes Seventh Actively Exploited Chrome Zero-Day of 2025https://cyberinsider.com/google-fixes-seventh-actively-exploited-chrome-zero-day-of-2025/Verified
- Google has patched a critical Chrome zero-day flaw - update your browser immediatelyhttps://www.tomsguide.com/computing/online-security/critical-chrome-zero-day-flaw-fixed-by-google-update-your-browser-right-nowVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust segmentation, enforced east-west controls, and egress policy would have limited attackers' ability to escalate, pivot, and exfiltrate data across cloud and SaaS environments. Real-time anomaly detection and distributed policy enforcement would enhance containment, visibility, and rapid response at each phase of the kill chain.
Control: Cloud Firewall (ACF)
Mitigation: Perimeter threats blocked and unauthorized inbound connections prevented.
Control: Zero Trust Segmentation
Mitigation: Role-based least privilege limits scope of misused credentials.
Control: East-West Traffic Security
Mitigation: Lateral movement detected and constrained within microsegments.
Control: Threat Detection & Anomaly Response
Mitigation: Suspicious outbound and C2 traffic detected and alerted in real time.
Control: Egress Security & Policy Enforcement
Mitigation: Unauthorized outbound data flows blocked, preventing exfiltration.
Autonomous inline policy limits malware spread and automates rapid incident containment.
Impact at a Glance
Affected Business Functions
- Network Security Operations
- Web Application Management
- User Data Protection
Estimated downtime: 3 days
Estimated loss: $500,000
Potential exposure of sensitive user data due to unauthorized administrative access and arbitrary code execution on affected systems.
Recommended Actions
Key Takeaways & Next Steps
- • Implement distributed Zero Trust Segmentation and microsegmentation to reduce lateral movement and restrict privilege escalation paths.
- • Enforce comprehensive egress security and policy controls to block unauthorized data exfiltration and monitor application-to-internet flows.
- • Deploy cloud-native firewalls with centralized policy and traffic visibility to protect perimeters and prevent initial exploit attempts.
- • Establish real-time threat detection, anomaly response, and comprehensive east-west visibility across multi-cloud and hybrid environments.
- • Integrate a cloud security fabric for autonomous inline enforcement, rapid incident response, and continuous control validation at cloud speed.



