• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

SharePoint Zero-day Persists Despite Microsoft Patches

Paul Balo by Paul Balo
July 22, 2025
in Security
Share on FacebookShare on Twitter

Microsoft’s emergency fixes have not stemmed the “ToolShell” tide. The critical SharePoint zero‑day (CVE‑2025‑53770, CVSS 9.8) is still being weaponised to plant a tiny ASPX back‑door on unpatched servers, and incident‑response teams continue to log fresh intrusions daily. Redmond’s out‑of‑band updates published 19 July cover SharePoint Subscription Edition (KB 5002768) and SharePoint 2019 (KB 5002754), but SharePoint 2016 remains exposed, leaving thousands of on‑prem deployments reliant on a stop‑gap PowerShell script while attackers probe every internet‑facing portal they can find. 

SecurityWeek and Rapid7 say the campaign has already breached more than 75 organisations across finance, defence and higher‑education; telemetry shows ToolShell callers beaconing from IP ranges in Russia and Vietnam, with follow‑on payloads that dump LSASS, steal machine keys and pivot laterally.  In several cases the threat actor re‑entered even after administrators installed July’s cumulative updates, because the attackers had exfiltrated cryptographic material that let them mint new authentication cookies at will. Experts therefore stress that patching must be paired with machine‑key rotation and credential resets. 

The U.S. Cybersecurity and Infrastructure Security Agency has added CVE‑2025‑53770 to its Known Exploited Vulnerabilities (KEV) catalogue, giving federal agencies 48 hours to apply Microsoft’s mitigations or disconnect affected servers. CISA’s alert notes that ToolShell exploits a deserialisation flaw in SharePoint’s workflow engine, requires no authentication and grants SYSTEM‑level code‑execution on successful hit. 

Microsoft’s interim guidance for vulnerable SharePoint 2016 boxes boils down to four actions: (1) install all July security updates, (2) run the hardening script that blocks remote procedure calls to suspect endpoints, (3) enable AMSI‑based scanning in Defender for Endpoint, and (4) rotate machine keys and reboot IIS. Redmond says the 2016 patch is “in final validation” and should land “within days,” but has not committed to a firm date. 

Detection teams should hunt for newly created ToolShell.aspx, spinstall0.aspx or similarly named files in /_layouts/15 and review logs for the user‑agent string toolshell‑loader/1.3 or outbound traffic to 94.103.9[.]0/24 and 193.23.181[.]0/24. Rapid7 warns that the campaign is “deliberate and persistence‑oriented,” with operators revisiting servers to drop Cobalt Strike and Bughatch within hours of initial compromise.

Here’s the bottom line, if your SharePoint server still faces the open internet and does not have KB 5002768 or KB 5002754 (or their forthcoming 2016 equivalent) plus rotated machine keys, you remain a sitting duck. Administrators unable to patch immediately should remove public exposure, implement Microsoft’s mitigation script and comb logs for any sign ToolShell has landed—because attackers aren’t waiting for the final update, and neither should you.

Related Posts:

  • 4025691-0-97050800-1753099410-original
    Microsoft Patches SharePoint Bug, Leaves 2016…
  • Microsoft SharePoint CTA
    Microsoft Warns of Critical SharePoint Zero-day…
  • 5cdb1bc21ea851eb0c74bf693121f711
    Chinese Hackers Exploiting SharePoint Zero-day - Microsoft
  • sharepoint-stock-image
    Hackers Team Up to Attack Microsoft SharePoint Systems
  • powershell-1024×683
    Microsoft Drops PowerShell 2.0 from Windows 11 & Server
  • dXmRB5MeFaufdWPnyWHf34
    Microsoft Adds Office Companion Apps to Windows 11 Taskbar
  • win10-new-1152×648
    Microsoft’s $1.50 Windows Update Fee Kicks In July 1
  • Computer-Giant-Dell-Allegedly-Breached-Employee-and-Partners-Data-Leaked
    Dell Confirms Data Breach, Claims only Demo Data Stolen

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cybersecuritymicrosoftsharepointSharePoint Zero-day Vulnerability
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • ChatGPT Users Get Memory Control and Access to Projects September 5, 2025
  • MTN Looking To Acquire Telkom September 5, 2025
  • Banks Arrange $38B Debt Package for Oracle-Linked Data Centres September 5, 2025
  • Google’s Antitrust AI Overviews Replace Links With Fast Search September 5, 2025
  • Sam George Reveals Government Plan to Merge AT Ghana and Telecel September 5, 2025
  • Nepal Just Shut Down Facebook, Instagram, YouTube and X September 5, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.