Hackers Target SharePoint Zero-Day Exploit Since July 7 to Steal Keys and Gain Ongoing Access

Published:

spot_img

Critical Microsoft SharePoint Vulnerability: A Growing Threat

Recent reports have shed light on a serious vulnerability affecting Microsoft SharePoint, with exploitation efforts dating back to July 7, 2025. Check Point Research revealed that attempts to exploit this critical flaw have already targeted a significant Western government, with increased activity noted on July 18 and 19 across various sectors, including government, telecommunications, and software in North America and Western Europe.

Nature of the Exploit

The attacks have been traced to three distinct IP addresses: 104.238.159.149, 107.191.58.76, and 96.9.125.147. Notably, one of these addresses has also been linked to previous exploits concerning vulnerabilities in Ivanti Endpoint Manager Mobile. According to Lotem Finkelstein, Director of Threat Intelligence at Check Point, the threats posed by this zero-day vulnerability are both urgent and sophisticated, endangering numerous organizations worldwide.

Finkelstein emphasized the critical nature of the situation, urging businesses to strengthen their security measures immediately. "We’ve seen dozens of attempted compromises since early July," he stated, highlighting that the exploit is both complex and rapidly evolving.

Vulnerabilities Identified

The attack chain primarily exploits CVE-2025-53770, a newly discovered flaw allowing remote code execution in SharePoint Server, and involves chaining it with CVE-2025-49706, a spoofing vulnerability patched during Microsoft’s July patch cycle. This combination enables attackers to gain initial access and escalate their privileges within compromised systems.

This month has revealed two sets of vulnerabilities in SharePoint:

  • CVE-2025-49704 (CVSS score: 8.8) – Remote Code Execution (patched July 8, 2025)
  • CVE-2025-49706 (CVSS score: 6.5) – Spoofing Vulnerability (patched July 8, 2025)

Additionally:

  • CVE-2025-53770 (CVSS score: 9.8) – Remote Code Execution
  • CVE-2025-53771 (CVSS score: 6.5) – Spoofing Vulnerability

The earlier vulnerabilities, referred to collectively as ToolShell, paved the way for the new flaws, which have been identified as variants indicating that they bypass the initial fixes.

Details of the Attack Methodology

Exploitation of CVE-2025-53770 involves a critical weakness in how SharePoint Server processes untrusted data. Attackers utilize malicious ASP.NET web shells to extract sensitive cryptographic keys. These keys are then employed to create and sign harmful payloads, allowing for unauthorized access and command execution on SharePoint Servers.

According to telemetry data from Bitdefender, the range of exploitation is vast, affecting numerous countries, including the United States, Canada, Germany, and Jordan. This indicates a global threat landscape that organizations need to take seriously.

Detection and Response

Palo Alto Networks Unit 42 has reported observing commands executed via PowerShell, with specific exploits geared toward creating files that run web shells to extract sensitive server information. The file spinstall0.aspx, for example, functions as a web shell capable of running various command functions to retrieve essential cryptographic material.

SentinelOne also highlighted its detection of different attack clusters, one of which deploys advanced techniques to avoid detection through in-memory execution without leaving files on disk. This method complicates forensic recovery and points to the sophistication behind the current exploitation attempts.

The Threat Landscape

Current estimates suggest that there are nearly 10,000 on-premise SharePoint servers online. With the nature of the sensitive information stored on these servers, they represent valuable targets for cybercriminals. The involvement of state-aligned threat actors, including those linked to China, raises alarms about the potential for extensive damage and breach of data across multiple sectors.

As organizations ramp up their security protocols, it is essential for them to act swiftly—updating security measures, rotating cryptographic keys, and restarting systems. With the name recognition and significant market presence of SharePoint, the urgent call for remediation has never been more critical for IT departments worldwide.

By staying informed and responsive, organizations can mitigate risks and protect themselves against these increasingly prevalent cyber threats.

spot_img

Related articles

Recent articles

China’s CPPCC National Committee Strengthens Development with 99.9% Proposal Response Rate at 14th Session Opening

China's CPPCC National Committee Strengthens Development with 99.9% Proposal Response Rate at 14th Session Opening BEIJING, CHINA - On March 7, 2026, the fourth session...

Kiztopia Strengthens Presence in Malaysia with Grand Opening of New Family Edutainment Centre in Johor Bahru

Kiztopia Strengthens Presence in Malaysia with Grand Opening of New Family Edutainment Centre in Johor Bahru JOHOR BAHRU, MALAYSIA – Kiztopia, a prominent family edutainment...

Quantum Computing in Cybersecurity Market Set to Surge 24.10% CAGR by 2032, Led by IBM and Google Quantum AI

Quantum Computing in Cybersecurity Market Set to Surge 24.10% CAGR by 2032, Led by IBM and Google Quantum AI The global Quantum Computing in Cybersecurity...

Trump Unveils 2026 Cyber Strategy to Strengthen Defense Against Hackers and Global Scams

Trump Unveils 2026 Cyber Strategy to Strengthen Defense Against Hackers and Global Scams The White House has unveiled a comprehensive cybersecurity strategy for 2026, aiming...