Article Details

Scrape Timestamp (UTC): 2025-07-28 12:17:53.568

Source: https://thehackernews.com/2025/07/weekly-recap-sharepoint-breach-spyware.html

Original Article Text

Click to Toggle View

⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More. Some risks don't breach the perimeter—they arrive through signed software, clean resumes, or sanctioned vendors still hiding in plain sight. This week, the clearest threats weren't the loudest—they were the most legitimate-looking. In an environment where identity, trust, and tooling are all interlinked, the strongest attack path is often the one that looks like it belongs. Security teams are now challenged to defend systems not just from intrusions—but from trust itself being turned into a weapon. ⚡ Threat of the Week Microsoft SharePoint Attacks Traced to China — The fallout from an attack spree targeting defects in on-premises Microsoft SharePoint servers continues to spread a week after the discovery of the zero-day exploits, with more than 400 organizations globally compromised. The attacks have been attributed to two known Chinese hacking groups tracked as Linen Typhoon (aka APT27), Violet Typhoon (aka APT31), and a suspected China-based threat actor codenamed Storm-2603 that has leveraged the access to deploy Warlock ransomware. The attacks leverage CVE-2025-49706, a spoofing flaw, and CVE-2025-49704, a remote code execution bug, collectively called ToolShell. Bloomberg reported that Microsoft is investigating whether a leak from Microsoft Active Protections Program (MAPP), which provides early access to vulnerability information to security software providers, may have led to the zero-day exploitation. China has denied allegations it was behind the campaign. Flare Customers Saw 321% ROI, Says Forrester Consulting Total Economic Impact™ (TEI) Study A new Forrester Consulting study commissioned by Flare shows how Flare's threat exposure management platform delivered 321% ROI, cut manual work by 75%, and paid for itself in under 6 months for a composite organization representative of interviewed customers. Get the full business case. 🔔 Top News ‎️‍🔥 Trending CVEs Hackers are quick to jump on newly discovered software flaws – sometimes within hours. Whether it’s a missed update or a hidden bug, even one unpatched CVE can open the door to serious damage. Below are this week’s high-risk vulnerabilities making waves. Review the list, patch fast, and stay a step ahead. This week's list includes — CVE-2025-54068 (Laravel Livewire Framework), CVE-2025-34300 (Lighthouse Studio), CVE-2025-6704, CVE-2025-7624 (Sophos Firewall), CVE-2025-40599 (SonicWall SMA 100 Series), CVE-2025-49656, CVE-2025-50151 (Apache Jena), CVE-2025-22230, CVE-2025-22247 (Broadcom VMware Tools), CVE-2025-7783 (form-data), CVE-2025-34140, CVE-2025-34141, CVE-2025-34142, CVE-2025-34143 (Hexagon ETQ Reliance), CVE-2025-8069 (AWS Client VPN for Windows), CVE-2025-7723, CVE-2025-7724 (TP-Link VIGI NVR), CVE-2025-7742 (LG Innotek LNV5110R), CVE-2025-24000 (Post SMTP), CVE-2025-52449, CVE-2025-52452, CVE-2025-52453, CVE-2025-52454, CVE-2025-52455 (Salesforce Tableau Server), and CVE-2025-6241 (SysTrack). 📰 Around the Cyber World 🎥 Cybersecurity Webinars 🔧 Cybersecurity Tools Disclaimer: These newly released tools are for educational use only and haven't been fully audited. Use at your own risk—review the code, test safely, and apply proper safeguards. 🔒 Tip of the Week Don't Trust Your Browser Blindly — Most people think of their browser as just a tool to get online — but in reality, it's one of the most exposed parts of your device. Behind the scenes, your browser quietly stores names, emails, companies, and sometimes even payment info. This data often lives in plain, unencrypted files that are easy to extract if someone gains local access — even briefly. For example, in Chrome or Edge, personal autofill details are stored in a file called Web Data, which is a basic SQLite database anyone with access can read. This means that if your machine is compromised — even by a simple script — your personal or even work identity can be quietly stolen. Red teamers and attackers love this kind of recon gold. It doesn't stop there. Browsers also keep session cookies, local storage, and site databases that often don't get wiped, even after logout. This data can allow attackers to hijack your logged-in sessions or extract sensitive info stored by web apps — including company tools. Even browser extensions, if malicious or hijacked, can quietly spy on your activity or inject bad code into pages you trust. Another weak spot? Browser extensions. Even legitimate-looking add-ons can have wide permissions — letting them read what you type, track your browsing, or inject scripts. If a trusted extension gets compromised in an update, it can silently become a data theft tool. This happens more often than people think. Here's how to reduce the risk: Browsers are essentially lightweight application platforms. If you're not auditing how they store data and who can access it, you're leaving a major gap open — especially on shared or endpoint-exposed machines. Conclusion This week's signals are less a conclusion and more a provocation: What else might we be misclassifying? What familiar data could become meaningful under a different lens? If the adversary thinks in systems, not symptoms, our defenses must evolve accordingly. Sometimes, the best response isn't a patch—it's a perspective shift. There's value in looking twice where others have stopped looking altogether.

Daily Brief Summary

NATION STATE ACTIVITY // Major SharePoint Exploits Linked to Chinese Hacking Groups

Microsoft SharePoint servers were targeted globally due to newly discovered zero-day exploits, affecting over 400 organizations.

The attackers, identified as Chinese hacking groups Linen Typhoon, Violet Typhoon, and a suspected actor codenamed Storm-2603, used these vulnerabilities to deploy Warlock ransomware.

Exploited vulnerabilities included CVE-2025-49706, a spoofing flaw, and CVE-2025-49704, a remote code execution bug, referred to collectively as ToolShell.

There is an ongoing investigation by Microsoft into whether a leak from the Microsoft Active Protections Program (MAPP) facilitated the zero-day exploit.

China has officially denied any involvement in these cyberattacks.

Exploitation highlighted the broader issue of legitimate-looking tools and engagements being used as vectors for sophisticated cyber threats.

The incident underscores the escalating challenges that security teams face in distinguishing between trustworthy and malicious sources within their digital environments.