The Containment Era is here. →Explore

Executive Summary

Between Q2 and Q3 2025, ESET researchers identified a significant rise in sophisticated Advanced Persistent Threat (APT) attacks spanning multiple regions and industry verticals. State-sponsored actors leveraged encrypted communications and advanced lateral movement tactics to compromise organizations’ east-west cloud traffic, successfully bypassing conventional perimeter defenses. These campaigns exploited unmonitored internal traffic and insufficient network segmentation, leading to the exfiltration of sensitive data and critical infrastructure disruptions. The attackers demonstrated thorough knowledge of multi-cloud environments, combining zero-day exploits with stolen credentials to maintain persistent access and evade detection for weeks.

This incident is emblematic of a broader trend—APT groups are accelerating the use of sophisticated, stealthy methods in hybrid cloud contexts. Modern enterprises must recognize the increased risk to east-west workloads, stay vigilant to evolving TTPs, and augment internal defenses in the face of rising geopolitical tensions and regulatory enforcement.

Why This Matters Now

This incident underscores the urgent need for organizations to address internal visibility gaps and enforce segmentation in multi-cloud and hybrid environments. As APT actors increasingly bypass traditional defenses and leverage encrypted channels, failure to adapt security controls now can leave businesses highly vulnerable to advanced, persistent threats.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The attacks exposed weaknesses in east-west traffic visibility, internal segmentation, and encryption of data in transit—impacting requirements across NIST, PCI DSS, and HIPAA.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Aviatrix CNSF controls such as zero trust segmentation, workload isolation, continuous east-west traffic monitoring, and strict egress enforcement would have detected, contained, or prevented the attacker's movement, command and control, and exfiltration, minimizing breach scope and business impact.

Initial Compromise

Control: Multicloud Visibility & Control

Mitigation: Unusual access events detected and alerted in real time.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Least-privilege network boundaries contain privilege escalation and prevent cross-environment abuse.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Lateral movement attempts are monitored, restricted, and can be blocked.

Command & Control

Control: Egress Security & Policy Enforcement

Mitigation: Outbound connections to unapproved destinations are blocked or flagged.

Exfiltration

Control: Encrypted Traffic (HPE)

Mitigation: Detection of anomalous encrypted data flows and prevention of unapproved transfers.

Impact (Mitigations)

Rapid detection and response to attack execution minimize dwell time and blast radius.

Impact at a Glance

Affected Business Functions

  • Email Communications
  • Virtualization Services
  • Enterprise Resource Planning
  • Endpoint Management
  • AI Data Processing
Operational Disruption

Estimated downtime: 7 days

Financial Impact

Estimated loss: $5,000,000

Data Exposure

Potential exposure of sensitive corporate emails, virtual machine data, ERP system information, endpoint configurations, and AI processing data.

Recommended Actions

  • Enforce identity-based zero trust segmentation and microsegmentation to contain lateral movement from compromised accounts or workloads.
  • Deploy continuous east-west traffic inspection and anomaly detection to spot unauthorized internal access or covert C2 activities.
  • Strictly manage and monitor egress connectivity using centralized policy enforcement, FQDN filtering, and egress NAT controls.
  • Harden Kubernetes and cloud-native workloads via pod-level firewalls, namespace segmentation, and runtime enforcement.
  • Maintain unified, centralized multicloud visibility and audit trails with automated alerting to enable rapid detection and response.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image