• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Hackers Team Up to Attack Microsoft SharePoint Systems

Akinola Ajibola by Akinola Ajibola
August 4, 2025
in Security
Share on FacebookShare on Twitter

A Microsoft SharePoint vulnerability chain has been the focus of continuing attacks by cybercriminals who has teamed up to be a ransomware gangs. This is part of a larger exploitation effort that has already resulted in the penetration of at least 148 organisations globally.

A 4L4MD4R ransomware variant, based on open-source Mauri870 code, was found by security researchers at Palo Alto Networks’ Unit 42 while investigating events employing this SharePoint exploit chain (named “ToolShell”).

After identifying a trojan loader that downloads and runs the ransomware from theinnovationfactory[.]it (145.239.97[.]206), the ransomware was identified on July 27.

After a failed effort at exploitation that exposed malicious PowerShell commands intended to turn off security monitoring on the targeted device, the loader was discovered.

“The 4L4MD4R payload was found to be GoLang-written and UPX-packed on analysis. When the sample is executed, it loads memory to load the decrypted PE file, decrypts an AES-encrypted payload in memory, and starts a new thread to run it,” Unit 42 stated.

The 4L4MD4R ransomware creates ransom notes and encrypted file lists on hacked computers, encrypts files on the compromised system, and wants 0.005 Bitcoin in payment.

Google and Microsoft have also connected Chinese threat actors to the ToolShell attacks; according to Microsoft security experts, three distinct state-sponsored hacker organizations which are Linen Typhoon, Violet Typhoon, and Storm-2603 are involved.

This campaign has so far compromised a number of high-profile targets, including as the Department of Education, the U.S. National Nuclear Security Administration, the Department of Revenue in Florida, the General Assembly of Rhode Island, and government networks in Europe and the Middle East.

“Microsoft has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon exploiting these vulnerabilities targeting internet-facing SharePoint servers,” stated Microsoft. Furthermore, we have seen that Storm-2603, a threat actor based in China, is taking advantage of these weaknesses. The use of these exploits by other actors is still being investigated.

ToolShell exploitation targeting CVE-2025-49706 and CVE-2025-49704 was first discovered by Dutch cybersecurity firm Eye Security in zero-day assaults, initially identifying 54 vulnerable organisations, including government agencies and international corporations. Check Point Research later discovered evidence of exploitation that dates back to 7 July and targets technology, telecommunications, and government organisations in Western Europe and North America.

In addition to assigning two new CVE IDs (CVE-2025-53770 and CVE-2025-53771) for zero-days used to compromise fully patched SharePoint servers, Microsoft fixed the two vulnerabilities in the July 2025 Patch Tuesday releases.

The actual scope goes far beyond initial estimates, according to Eye Security Chief Technology Officer Piet Kerkhofs, who told a media agency that the attackers have infected at least 400 servers with malware across the networks of at least 148 organisations, many of which have been compromised for extended periods of time.

In addition to ordering government agencies to secure their systems within 24 hours, the Cybersecurity and Infrastructure Security Agency (CISA) has added the ToolShell exploit chain’s CVE-2025-53770 remote code execution vulnerability to its list of exploited vulnerabilities.

This comes at a time when Heimdal Security shared some safety advised on SharePoint zero-day (CVE-2025-53770) under active exploitation.

Related Posts:

  • Microsoft SharePoint CTA
    Microsoft Warns of Critical SharePoint Zero-day…
  • 5cdb1bc21ea851eb0c74bf693121f711
    Chinese Hackers Exploiting SharePoint Zero-day - Microsoft
  • 4025691-0-97050800-1753099410-original
    Microsoft Patches SharePoint Bug, Leaves 2016…
  • microsoft-sharepoint-104_v-variantBig1x1_w-1280_zc-3061602c
    SharePoint Zero-day Persists Despite Microsoft Patches
  • 960×0 (1)
    Medusa Ransomware Targets Over 200 Gmail Users
  • GettyImages-2175312180
    UK Outlaws Ransomware Payments by Government Agencies
  • router-595x335_0
    US And UK Warn Of Custom Malware Vulnerability On…
  • 1743588188581
    Hackers use Microsoft Teams to spread Matanbuchus malware

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cybersecuritymicrosoft sharepointsharepoint
Akinola Ajibola

Akinola Ajibola

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • How to Read Faster: 10 Best Speed Reading Apps in 2025 (Ranked & Reviewed) August 31, 2025
  • WhatsApp Working On Shorter Disappearing Message Timers August 29, 2025
  • Threads Tests Long-Form Text Sharing Feature August 29, 2025
  • WhatsApp Tests AI to Rephrase Messages and Adjust Tone August 29, 2025
  • Musk’s xAI Unveils New Agentic Coding Model August 29, 2025
  • Google Launches Pixel Care+ Device Protection August 29, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.