Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

An unattributed threat actor exploited an end-of-life F5 BIG-IP appliance to gain an initial foothold, then chained credential theft from an unpatched Atlassian Confluence server into Kerberos relay attacks against Active Directory and Azure-hosted infrastructure via CVE-2025-33073 (CVSS 9.5). The attack succeeded through accumulated security debt: expired perimeter appliances, over-privileged service accounts, and embedded credentials in Confluence, not novel zero-day techniques. Organizations running EOL network edge devices alongside unpatched internal collaboration platforms face immediate risk of full Active Directory compromise and cloud tenant access loss.

Author

Tech Jacks Solutions