Cybersecurity Breach Linked to Windows Server Update Service Vulnerability
Recent investigations by cybersecurity firm Sophos have revealed that over 50 organizations, primarily based in the United States, have fallen victim to a series of attacks exploiting a significant vulnerability in the Windows Server Update Service (WSUS). This vulnerability, identified as CVE-2025-59287, pertains to the deserialization of untrusted data. Despite a security update released by Microsoft in mid-October, the patch proved insufficient, prompting the company to issue an emergency out-of-band update just last week.
Sophos’s telemetry data has recorded six specific incidents tied to this exploitation, while additional intelligence indicates a broader impact affecting at least 50 organizations. Rafe Pilling, the director of threat intelligence at Sophos, noted in correspondence with Cybersecurity Dive that this situation may represent an initial phase of testing or reconnaissance by attackers, who are likely analyzing the data collected to uncover further intrusion opportunities.
The WSUS platform is a critical tool for IT administrators, facilitating the management of product updates from Microsoft. Among the affected entities are various sectors, including technology firms, educational institutions, manufacturing companies, and healthcare organizations, as highlighted in a recent LinkedIn post by Pilling.
Researchers from the Google Threat Intelligence Group have connected the exploitation activities to a hacker group designated as UNC6512. Following initial access, this group has engaged in reconnaissance on compromised systems and has also exfiltrated sensitive data. Furthermore, analysts at Eye Security have identified two distinct actors involved in the exploitation, building upon previous threat research shared by Huntress Labs.
Sophos first detected malicious activity targeting its customers on October 24, a day after Microsoft released the out-of-band patch. In response to the growing concern, the Cybersecurity and Infrastructure Security Agency (CISA) has added this vulnerability to its Known Exploited Vulnerabilities catalog. CISA has since urged security teams to promptly apply the necessary Microsoft patches and conduct thorough checks of their systems for any signs of compromise.