A overseas risk actor infiltrated the Kansas Metropolis Nationwide Safety Campus (KCNSC), a key manufacturing web site inside the Nationwide Nuclear Safety Administration (NNSA), exploiting unpatched Microsoft SharePoint vulnerabilities, in keeping with a supply concerned in an August incident response on the facility.
The breach focused a plant that produces the overwhelming majority of essential non-nuclear parts for US nuclear weapons underneath the NNSA, a semi-autonomous company inside the Division of Power (DOE) that oversees the design, manufacturing, and upkeep of the nation’s nuclear weapons. Honeywell Federal Manufacturing & Applied sciences (FM&T) manages the Kansas Metropolis campus underneath contract to the NNSA.
The Kansas Metropolis campus, Honeywell FM&T, and the Division of Power didn’t reply to repeated requests for remark all through September, nicely earlier than the present authorities shutdown. NSA public affairs officer Eddie Bennett did reply, saying, “We now have nothing to contribute,” and referred CSO again to the DOE.
Though it’s unclear whether or not the attackers had been a Chinese language nation-state actor or Russian cybercriminals — the 2 most probably culprits — specialists say the incident drives residence the significance of securing methods that shield operational expertise from exploits that primarily have an effect on IT methods.
How the breach unfolded
The attackers exploited two lately disclosed Microsoft SharePoint vulnerabilities — CVE-2025-53770, a spoofing flaw, and CVE-2025-49704, a distant code execution (RCE) bug — each affecting on-premises servers. Microsoft issued fixes for the vulnerabilities on July 19.
On July 22, the NNSA confirmed it was one of many organizations hit by assaults enabled by the SharePoint flaws. “On Friday, July 18th, the exploitation of a Microsoft SharePoint zero-day vulnerability started affecting the Division of Power,” a DOE spokesperson mentioned.
Nonetheless, the DOE contended on the time, “The division was minimally impacted as a result of its widespread use of the Microsoft M365 cloud and really succesful cybersecurity methods. A really small variety of methods had been impacted. All impacted methods are being restored.”
By early August, federal responders, together with personnel from the NSA, had been on-site on the Kansas Metropolis facility, the supply tells CSO.
Positioned in Missouri, the KCNSC manufactures non-nuclear mechanical, digital, and engineered materials parts utilized in US nuclear protection methods. It additionally supplies specialised technical companies, together with metallurgical evaluation, analytical chemistry, environmental testing, and simulation modeling.
Roughly 80% of the non-nuclear elements within the nation’s nuclear stockpile originate from KCNSC. Whereas most design and programmatic particulars stay categorised, the plant’s manufacturing function makes it one of the delicate amenities within the federal weapons complicated.
China or Russia? Conflicting attribution
Microsoft attributed the broader wave of SharePoint exploitations to a few Chinese language-linked teams: Linen Hurricane, Violet Hurricane, and a 3rd actor it tracks as Storm-2603. The corporate mentioned the attackers had been making ready to deploy Warlock ransomware throughout affected methods.
Nonetheless, the supply acquainted with the Kansas Metropolis incident tells CSO {that a} Russian risk actor, not a Chinese language one, was accountable for the intrusion. Cybersecurity firm Resecurity, which was monitoring the SharePoint exploitations, tells CSO that its personal information pointed primarily to Chinese language nation-state teams, but it surely doesn’t rule out Russian involvement.
Resecurity’s researchers say that whereas Chinese language teams appeared to have developed and deployed the preliminary zero-day, financially motivated Russian actors might have independently reproduced the exploit earlier than technical particulars started circulating in late June.
In Might, researchers at Viettel Cyber Safety demonstrated an assault chaining two SharePoint flaws, CVE-2025-49706 and CVE-2025-49704, at Pwn2Own Berlin. Resecurity researchers inform CSO that these demonstrations possible accelerated the reverse-engineering of the vulnerabilities by a number of risk actors.
Resecurity’s analysts noticed early-stage scanning and exploitation exercise from infrastructure situated in Taiwan, Vietnam, South Korea, and Hong Kong, a distribution sample in step with techniques utilized by Chinese language superior persistent risk (APT) teams to disguise attribution.
“The foundation reason for the SharePoint exploitation is carefully associated to misuse of the Microsoft Energetic Protections Program (MAPP) by China,” Resecurity researchers inform CSO. “Probably the most possible perpetrators are Chinese language nation-state actors reminiscent of Linen Hurricane and Violet Hurricane.”
Nonetheless, they are saying that yet one more manner that Russia-based risk actors may have acquired information of the vulnerability early on was by way of underground exchanges or by analyzing community scanning information as soon as the exploit grew to become identified. The transition from zero-day to N-day standing, they are saying, opened a window for secondary actors to use methods that had not but utilized the patches.
May the assault have reached operational methods?
The breach focused the IT facet of the Kansas Metropolis campus, however the intrusion raises the query of whether or not attackers may have moved laterally into the ability’s operational expertise (OT) methods, the manufacturing and course of management environments that instantly help weapons part manufacturing.
OT cybersecurity specialists interviewed by CSO say that KCNSC’s manufacturing methods are possible air-gapped or in any other case remoted from company IT networks, considerably decreasing the danger of direct crossover. However, they warning towards assuming such isolation ensures security.
“We now have to essentially contemplate and assume by way of how state actors doubtlessly exploit IT vulnerabilities to realize entry to that operational expertise,” Jen Sovada, normal supervisor of public sector operations at Claroty, talking typically and never concerning the particular incident, tells CSO.
“When you could have a facility just like the KCNSC the place they do nuclear weapons lifecycle administration — design, manufacturing, emergency response, decommissioning, provide chain administration — there are a number of interconnected capabilities,” Sovada says. “If an actor can transfer laterally, they might influence programmable logic controllers that run robotics or precision meeting tools for non-nuclear weapon parts.”
Such entry, Sovada provides, may additionally have an effect on distribution management methods that oversee high quality assurance, or supervisory management and information acquisition (SCADA) methods that handle utilities, energy, and environmental controls. “It’s broader than simply an IT vulnerability,” she says.
IT/OT convergence and the zero-trust hole
The Kansas Metropolis incident highlights a systemic drawback throughout the federal enterprise: the disconnect between IT and OT security practices. Whereas the federal authorities has superior its zero-trust roadmap for conventional IT networks, comparable frameworks for operational environments have lagged, though latest developments level to progress on that entrance.
“There’s an IT fan chart that maps all the controls for zero belief, segmentation, authentication, and id administration,” Sovada says. “However there’s additionally an OT fan chart being developed by the Division of Protection that can outline comparable controls for zero belief in operational expertise. The purpose is to marry the 2, in order that zero belief turns into complete throughout all community varieties.”
That alignment, she says, is important to stopping intrusions just like the one which struck KCNSC from cascading into bodily operations.
Even non-classified information theft holds strategic worth
If the supply’s declare of Russian involvement is correct, the attackers might have been financially motivated ransomware operators quite than state intelligence companies. However even in that situation, the info they accessed may nonetheless carry strategic worth.
“It will make sense that if it had been a ransomware actor they usually obtained this type of information about nuclear weapons manufacturing, they could pause and hand it off to the suitable Russian authorities officers or specialists,” Sovada tells CSO.
Though there is no such thing as a proof that categorised data was compromised, even unclassified technical information can have important implications. “It could possibly be one thing so simple as necessities paperwork that will not be categorised however reveal the extent of precision required for parts,” Sovada says. “In weapons manufacturing, a millimeter distinction can change a tool’s trajectory or the reliability of its arming mechanism.”
Such data may help adversaries in understanding US weapons tolerances, provide chain dependencies, or manufacturing processes, all of that are delicate even when not formally secret.
Whether or not the intruders had been Chinese language state actors or Russian cybercriminals, the Kansas Metropolis breach exposes the delicate intersection of IT and operational security throughout essential protection infrastructure. As Sovada stresses, “We will’t simply consider zero belief as an IT idea anymore. It has to increase into the bodily methods that underpin nationwide protection.”



