• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Chinese Hackers Exploiting SharePoint Zero-day – Microsoft

Paul Balo by Paul Balo
July 22, 2025
in Security
Share on FacebookShare on Twitter

Chinese state‑linked hackers have now been confirmed as the driving force behind the “ToolShell” attacks that are ripping through on‑premises Microsoft SharePoint servers, and Britain’s National Cyber Security Centre says a “limited number” of UK organisations have already been breached. Microsoft’s own threat‑intelligence team attributes the exploitation of CVE‑2025‑53770 and its twin, CVE‑2025‑53771, to three Beijing‑nexus groups—Linen Typhoon (APT31), Violet Typhoon (APT15) and Storm‑2603—whose operatives began scanning the internet on 7 July, pouncing on any server that hadn’t applied or had only partially applied July’s security updates. Once in, the attackers drop a 9 KB web shell, ToolShell.aspx, which steals SharePoint machine‑key material, forges authentication cookies and gives SYSTEM‑level control over the host before pivoting laterally into the wider Windows domain. 

Eye Security telemetry and Microsoft logs show at least seventy‑five confirmed victims worldwide, spanning finance, defence, higher‑education and—crucially for UK readers—unnamed local public‑sector bodies. The NCSC told Reuters it is actively supporting domestic organisations hit by the campaign, and it has urged every administrator to patch “without delay or, if that is not possible, to remove the server from public exposure immediately.”

Microsoft has raced to close the door, publishing out‑of‑band patches for every supported on‑prem SharePoint build, yet timing still matters. Subscription Edition and SharePoint 2019 received fixes (KB 5002768 and KB 5002754/KB 5002753) on 19 July; Enterprise Server 2016 lagged until 22 July, when KB 5002760 and KB 5002759 finally arrived. The vendor warns that installing the update is only step one: administrators must rotate SharePoint’s ASP.NET machine keys with Update‑SPMachineKey, restart IIS and, ideally, enable AMSI‑based real‑time scanning to stop unauthenticated exploit traffic. 

Until those steps are complete, a vulnerable server is a beacon. The public proof‑of‑concept exploit—released on GitHub within hours of Microsoft’s disclosure—needs a single SOAP request to succeed. Logs reveal the payload as a POST to /_layouts/15/ToolPane.aspx with the user‑agent string toolshell‑loader/1.3; following execution, attackers beacon to command‑and‑control infrastructure in the ranges 94.103.9.* and 193.23.181.*. On compromised hosts investigators routinely find the file C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\16\TEMPLATE\LAYOUTS\spinstall0.aspx, confirmation that the machine‑key theft stage has already happened. 

CISA’s inclusion of CVE‑2025‑53770 in its Known Exploited Vulnerabilities catalogue gives US federal agencies just forty‑eight hours to install or mitigate; UK critical‑national‑infrastructure operators will almost certainly find similar pressure flowing from the NCSC and sector regulators. For private firms the commercial risk is no less acute: once ToolShell lands, intruders have been observed deploying Cobalt Strike or Bughatch within hours, turning an espionage foothold into a ransomware staging area.

In practical terms the to‑do list is straightforward but urgent. Patch the correct KB for your SharePoint version, run the machine‑key rotation job, enable AMSI/Defender full mode, scour IIS logs for the indicator strings above and reset any credentials stored in web.config files. For any server that cannot be patched immediately—especially legacy 2010 and 2013 builds, which Microsoft no longer supports—the safest course is to pull it off the public internet and proxy necessary access through a VPN or reverse‑proxy that inspects inbound traffic.

With Chinese state operators, a public proof‑of‑concept and thousands of UK‑hosted SharePoint instances still exposed, ToolShell has become the highest‑priority enterprise threat of the summer. The window to act is closing fast; the attackers have a head start, and every unpatched portal is an open invitation. 

Related Posts:

  • sharepoint-stock-image
    Hackers Team Up to Attack Microsoft SharePoint Systems
  • microsoft-sharepoint-104_v-variantBig1x1_w-1280_zc-3061602c
    SharePoint Zero-day Persists Despite Microsoft Patches
  • 4025691-0-97050800-1753099410-original
    Microsoft Patches SharePoint Bug, Leaves 2016…
  • Microsoft SharePoint CTA
    Microsoft Warns of Critical SharePoint Zero-day…
  • win10-new-1152×648
    Microsoft’s $1.50 Windows Update Fee Kicks In July 1
  • powershell-1024×683
    Microsoft Drops PowerShell 2.0 from Windows 11 & Server
  • router-595x335_0
    US And UK Warn Of Custom Malware Vulnerability On…
  • skynews-russia-hacker_5812455
    Russian Hackers Target WhatsApp for Data on Ukraine

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: chinahackersmicrosoftsharepointSharePoint Zero-day Vulnerabilitytoolshell
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • ChatGPT Users Get Memory Control and Access to Projects September 5, 2025
  • MTN Looking To Acquire Telkom September 5, 2025
  • Banks Arrange $38B Debt Package for Oracle-Linked Data Centres September 5, 2025
  • Google’s Antitrust AI Overviews Replace Links With Fast Search September 5, 2025
  • Sam George Reveals Government Plan to Merge AT Ghana and Telecel September 5, 2025
  • Nepal Just Shut Down Facebook, Instagram, YouTube and X September 5, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.