• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Chinese Hackers Exploiting SharePoint Zero-day – Microsoft

Paul Balo by Paul Balo
July 22, 2025
in Security
Share on FacebookShare on Twitter

Chinese state‑linked hackers have now been confirmed as the driving force behind the “ToolShell” attacks that are ripping through on‑premises Microsoft SharePoint servers, and Britain’s National Cyber Security Centre says a “limited number” of UK organisations have already been breached. Microsoft’s own threat‑intelligence team attributes the exploitation of CVE‑2025‑53770 and its twin, CVE‑2025‑53771, to three Beijing‑nexus groups—Linen Typhoon (APT31), Violet Typhoon (APT15) and Storm‑2603—whose operatives began scanning the internet on 7 July, pouncing on any server that hadn’t applied or had only partially applied July’s security updates. Once in, the attackers drop a 9 KB web shell, ToolShell.aspx, which steals SharePoint machine‑key material, forges authentication cookies and gives SYSTEM‑level control over the host before pivoting laterally into the wider Windows domain. 

Eye Security telemetry and Microsoft logs show at least seventy‑five confirmed victims worldwide, spanning finance, defence, higher‑education and—crucially for UK readers—unnamed local public‑sector bodies. The NCSC told Reuters it is actively supporting domestic organisations hit by the campaign, and it has urged every administrator to patch “without delay or, if that is not possible, to remove the server from public exposure immediately.”

Microsoft has raced to close the door, publishing out‑of‑band patches for every supported on‑prem SharePoint build, yet timing still matters. Subscription Edition and SharePoint 2019 received fixes (KB 5002768 and KB 5002754/KB 5002753) on 19 July; Enterprise Server 2016 lagged until 22 July, when KB 5002760 and KB 5002759 finally arrived. The vendor warns that installing the update is only step one: administrators must rotate SharePoint’s ASP.NET machine keys with Update‑SPMachineKey, restart IIS and, ideally, enable AMSI‑based real‑time scanning to stop unauthenticated exploit traffic. 

Until those steps are complete, a vulnerable server is a beacon. The public proof‑of‑concept exploit—released on GitHub within hours of Microsoft’s disclosure—needs a single SOAP request to succeed. Logs reveal the payload as a POST to /_layouts/15/ToolPane.aspx with the user‑agent string toolshell‑loader/1.3; following execution, attackers beacon to command‑and‑control infrastructure in the ranges 94.103.9.* and 193.23.181.*. On compromised hosts investigators routinely find the file C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\16\TEMPLATE\LAYOUTS\spinstall0.aspx, confirmation that the machine‑key theft stage has already happened. 

CISA’s inclusion of CVE‑2025‑53770 in its Known Exploited Vulnerabilities catalogue gives US federal agencies just forty‑eight hours to install or mitigate; UK critical‑national‑infrastructure operators will almost certainly find similar pressure flowing from the NCSC and sector regulators. For private firms the commercial risk is no less acute: once ToolShell lands, intruders have been observed deploying Cobalt Strike or Bughatch within hours, turning an espionage foothold into a ransomware staging area.

In practical terms the to‑do list is straightforward but urgent. Patch the correct KB for your SharePoint version, run the machine‑key rotation job, enable AMSI/Defender full mode, scour IIS logs for the indicator strings above and reset any credentials stored in web.config files. For any server that cannot be patched immediately—especially legacy 2010 and 2013 builds, which Microsoft no longer supports—the safest course is to pull it off the public internet and proxy necessary access through a VPN or reverse‑proxy that inspects inbound traffic.

With Chinese state operators, a public proof‑of‑concept and thousands of UK‑hosted SharePoint instances still exposed, ToolShell has become the highest‑priority enterprise threat of the summer. The window to act is closing fast; the attackers have a head start, and every unpatched portal is an open invitation. 

Related Posts:

  • sharepoint-stock-image
    Hackers Team Up to Attack Microsoft SharePoint Systems
  • microsoft-sharepoint-104_v-variantBig1x1_w-1280_zc-3061602c
    SharePoint Zero-day Persists Despite Microsoft Patches
  • 4025691-0-97050800-1753099410-original
    Microsoft Patches SharePoint Bug, Leaves 2016…
  • Microsoft SharePoint CTA
    Microsoft Warns of Critical SharePoint Zero-day…
  • Nigeria-Police-oje751ajvij3f7dy7z0qk7rmbhejx6zy56z3i8uxdc
    Nigerian Authorities Arrest Developer Linked to…
  • win10-new-1152×648
    Microsoft’s $1.50 Windows Update Fee Kicks In July 1
  • edge
    Microsoft Restricts Edge IE Mode After Zero-Day Attacks
  • Apple_google-partner-on-covid-19-contact-tracing-technology_04102020_LP_hero.jpg.og
    Emergency Zero-Day Patch Updates From Apple & Google

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: chinahackersmicrosoftsharepointSharePoint Zero-day Vulnerabilitytoolshell
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Microsoft Gaming Revenue Falls as Xbox Hardware Sales Drop January 29, 2026
  • CBN Upgrades OPay, Moniepoint and Others to National Licences January 29, 2026
  • Samsung Profit Surges as AI Chip Demand Booms January 29, 2026
  • Meta Reports Strong Q4, Full-Year 2025 as Ad Revenue Surges January 29, 2026
  • Tesla’s Vehicle Margins Fall as Musk Focuses on AI and Robotics January 29, 2026
  • Microsoft Earnings Show Rising AI Spend, Cloud Under Scrutiny January 29, 2026
  • YouTubers Sue Snap Over Copyright Infringement in AI Models January 28, 2026
  • Sony Plans A State of Play Broadcast in February January 28, 2026
  • TikTok Avoids Trial, Settles Lawsuit Over Addiction Claims January 27, 2026
  • Ezra Olubi Sues David Hundeyin for ₦140M Over X Defamation January 27, 2026
  • Lagos & MTN Team Up on Eco-Friendly Obalende Bus Park January 27, 2026
  • France Ditches Microsoft Teams, Zoom for Homegrown ‘Sovereign’ Platform January 27, 2026

Browse Archives

January 2026
MTWTFSS
 1234
567891011
12131415161718
19202122232425
262728293031 
« Dec    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.