Advisories

ZeroFox Weekly Intelligence Brief – August 16, 2025

|by Alpha Team

banner image

ZeroFox Weekly Intelligence Brief – August 16, 2025

ZeroFox’s Weekly Intelligence Briefing highlights the major developments and trends across the threat landscape, including digital, cyber, and physical threats. ZeroFox Intelligence is derived from a variety of sources, including—but not limited to—curated open-source accesses, vetted social media, proprietary data sources, and direct access to threat actors and groups through covert communication channels. Information relied upon to complete any report cannot always be independently verified. As such, ZeroFox applies rigorous analytic standards and tradecraft in accordance with best practices and includes caveat language and source citations to clearly identify the veracity of our Intelligence reporting and substantiate our assessments and recommendations. All sources used in this particular Intelligence product were identified prior to 6:00 AM (EDT) on August 14, 2025; per cyber hygiene best practices, caution is advised when clicking on any third-party links.

Read the Brief

View the full report here

Russia Linked to Dam Cyberattack in Norway, Officials Say

What we know:

  • Oslo has formally attributed a cyberattack to Russia after hackers briefly seized control of a Norwegian dam earlier this year.
  • On April 7, 2025, Russian hackers briefly took control of a hydropower dam in Bremanger, Western Norway.
  • They opened a flood gate, releasing 500 litres (132 gallons) of water per second for four hours before the breach was detected and stopped.
  • No injuries occurred, but it marked the first time Norway officially attributed such an attack to Russia.

New AI Exploit Targets ChatGPT Connectors to Access Sensitive Cloud Data

What we know:

  • A new flaw, dubbed AgentFlayer, enables attackers to steal sensitive data from users’ connected accounts (such as Google Drive) without any clicks.

Law Enforcement Agencies Using TETRA Radio Risk Eavesdropping

What we know:

  • Newly detected security issues in the Terrestrial Trunked Radio (TETRA) communications protocol, widely used by law enforcement and the military in various countries, can be exploited to intercept radio communications.

Tags: tlp:green