New Wave of Ransomware Targeting Vulnerable SharePoint Servers
Ongoing Threat to Microsoft SharePoint
Recent reports highlight an increasing threat stemming from vulnerabilities in Microsoft SharePoint. Security researchers from Palo Alto Networks’ Unit 42 have identified a new group deploying ransomware specifically targeting these weaknesses. This troubling development adds to the already significant security challenges SharePoint administrators face.
Overview of ToolShell Vulnerabilities
The vulnerabilities, collectively referred to as ToolShell, have been known since May. Initially, they garnered attention as a method for espionage activities linked to hackers from the People’s Republic of China. However, the landscape has shifted, with criminal actors now exploiting these same vulnerabilities for financial gain. This shift underscores a growing trend where opportunistic hackers are capitalizing on known security flaws to deploy ransomware.
Increased Risk for Self-Hosted SharePoint Instances
As Unit 42 notes, while Software as a Service (SaaS) environments remain secure, self-hosted instances of SharePoint are particularly at risk. Institutions such as government agencies, educational institutions, healthcare organizations, and large enterprises must remain vigilant. The immediate risk posed to these environments necessitates a proactive approach to security.
Insights from Unit 42’s Findings
On July 29, Unit 42 released an update detailing the evolving threat landscape surrounding ToolShell vulnerabilities. They indicated that the ransomware group is actively targeting self-hosted SharePoint servers, it specifically aims for high-impact environments. This recent activity marks a worrying trend of ransomware adoption among hackers who previously focused solely on espionage.
Investigation into Recent Ransomware Deployment
Further examination of ToolShell’s exploitation has revealed the deployment of 4L4MD4R ransomware, a variant closely related to the open-source Mauri870 ransomware. This finding was reported by Unit 42 on July 31, following their initial observations of the threat on July 27. Investigators noted the unidentified actor used a PowerShell command to disable security monitoring systems—an indication of a well-planned approach to bypass existing defenses.
Technical Analysis of 4L4MD4R
The 4L4MD4R ransomware exhibits sophisticated programming techniques; it is packed using UPX and written in GoLang. Upon execution, it decrypts an AES-encrypted payload in memory, thereby initiating its malicious operations. This technical complexity highlights the sophistication of current ransomware threats.
Once activated, the ransomware encrypts user files and deposits two key files on the victim’s desktop: one named DECRYPTION_INSTRUCTIONS.html, which serves as the ransom note, and another named ENCRYPTED_LIST.html, detailing all affected files. This streamlining of communication is designed to enhance clarity for the victim, emphasizing the urgency of the situation.
The Ransom Note’s Content
The ransom note outlines the seriousness of the encryption, informing victims of the types of files affected—documents, photos, videos, and databases. It sternly warns against attempting to recover the files without following the provided instructions, stating, “Any attempt to decrypt the files will result in permanent data loss.” This manipulation tactic is common among ransomware actors to induce panic and compliance.
Payment Demands
Lastly, the hackers demand a ransom payment of 0.005 Bitcoin, approximately $500. Notably, the ransom note indicates that alternative payment methods are available for those who may struggle with the financial demand. This flexibility is part of the hackers’ strategy to increase the likelihood of payment.
Conclusion
As the threat from ransomware targeting SharePoint servers continues to evolve, organizations must take immediate action to secure their systems. The ability of these actors to exploit known vulnerabilities highlights the critical importance of regular security audits, timely software updates, and employee training on cybersecurity measures.


