Article Details
Scrape Timestamp (UTC): 2025-07-22 11:27:21.752
Original Article Text
Click to Toggle View
Microsoft Sharepoint ToolShell attacks linked to Chinese hackers. Hackers with ties to the Chinese government have been linked to a recent wave of widespread attacks targeting a Microsoft SharePoint zero-day vulnerability chain. They used this exploit chain (dubbed "ToolShell") to breach dozens of organizations worldwide after hacking into their on-premise SharePoint servers. "We assess that at least one of the actors responsible for this early exploitation is a China-nexus threat actor. It's critical to understand that multiple actors are now actively exploiting this vulnerability," Charles Carmakal, CTO of Google Cloud's Mandiant Consulting, told BleepingComputer. "We fully anticipate that this trend will continue, as various other threat actors, driven by diverse motivations, will leverage this exploit as well." On Friday, Dutch cybersecurity firm Eye Security first spotted zero-day attacks exploiting the CVE-2025-49706 and CVE-2025-49704 vulnerabilities (first demoed during the Berlin Pwn2Own hacking contest by Viettel Cyber Security researchers) and informed BleepingComputer that at least 54 organizations had already been compromised, including several multinational companies and national government entities. Microsoft patched the two flaws as part of the July Patch Tuesday updates and assigned two new CVE IDs (CVE-2025-53770 and CVE-2025-53771) over the weekend for zero-days used by threat actors to compromise fully patched SharePoint servers. Since then, the company released emergency patches for SharePoint Subscription Edition, SharePoint 2019, and SharePoint 2016 to address both RCE flaws. CISA has also added the CVE-2025-53770 remote code execution vulnerability to its Known Exploited Vulnerability catalog, ordering federal agencies to apply patches one day after they were released. "This exploitation activity, publicly reported as 'ToolShell,' provides unauthenticated access to systems and enables malicious actors to fully access SharePoint content, including file systems and internal configurations, and execute code over the network," the cybersecurity agency said. "Microsoft is responding quickly, and we are working with the company to help notify potentially impacted entities about recommended mitigations. CISA encourages all organizations with on-premise Microsoft SharePoint servers to take immediate recommended action." On Monday, after Microsoft released security patches for all impacted SharePoint versions, a CVE-2025-53770 proof-of-concept exploit was also released on GitHub, making it easier for more threat actors and hacking groups to join ongoing attacks. The Board Report Deck CISOs Actually Use CISOs know that getting board buy-in starts with a clear, strategic view of how cloud security drives business value. This free, editable board report deck helps security leaders present risk, impact, and priorities in clear business terms. Turn security updates into meaningful conversations and faster decision-making in the boardroom.
Daily Brief Summary
Chinese-linked threat actors targeted multiple organizations worldwide by exploiting zero-day vulnerabilities in Microsoft SharePoint.
The attack utilized a vulnerability chain known as "ToolShell," initially identified in on-premise SharePoint servers and linked to nation-state actors.
Dutch cybersecurity experts detected the attacks, revealing that at least 54 organizations, including multinational corporations and government entities, were breached.
Microsoft responded by patching the vulnerabilities (CVE-2025-49706 and CVE-2025-49704) in their July updates, later reassigning them new CVE IDs due to ongoing exploitation.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) categorized one exploit as "known exploited" and mandated federal agencies to apply patches promptly.
After the initial patches, Microsoft issued additional emergency patches for several versions of SharePoint to tackle the remote code execution flaws.
Following the release of security measures, a proof-of-concept exploit for CVE-2025-53770 was also published on GitHub, potentially facilitating further attacks by other malicious actors.