Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Says Chinese APTs Exploited ToolShell Zero-Days Weeks Before Patch

Microsoft Says Chinese APTs Exploited ToolShell Zero-Days Weeks Before Patch

Posted on July 22, 2025July 22, 2025 By CWS

Microsoft says Chinese language menace actors began exploiting SharePoint zero-day vulnerabilities weeks earlier than they have been patched. Nevertheless, particulars shared by the tech big convey additional confusion as to precisely which CVEs have been exploited. 

An evaluation performed by the tech big discovered that exploitation of the SharePoint zero-days named ToolShell began as early as July 7. The primary public reviews of assaults have been triggered by exploitation makes an attempt seen on July 18. 

Some members of the cybersecurity trade have already attributed the primary wave of ToolShell assaults to China, saying that high-value targets in varied sectors had been hit.

Nevertheless, Microsoft’s timeline means that Chinese language hackers had recognized concerning the potential influence and worth of the vulnerabilities a lot sooner than beforehand believed.

In response to Microsoft, two Chinese language state-sponsored menace actors tracked as Linen Hurricane and Violet Hurricane have tried to make use of the ToolShell vulnerabilities for preliminary entry. As well as, the corporate has seen a 3rd menace group — named Storm-2603 and linked to China with medium confidence — conducting zero-day assaults.

Linen Hurricane has been round since 2012, stealing mental property from organizations within the protection, authorities, human rights and strategic planning sectors. Violet Hurricane is a cyberespionage group that has been round for a decade, focusing on former navy and authorities personnel, NGOs, universities, media corporations, suppose tanks, monetary companies, and different organizations within the US, Europe and East Asia.

Within the ToolShell assaults seen by Microsoft, the hackers exploited vulnerabilities to bypass authentication and execute code on weak on-premises SharePoint servers. The attackers then deployed an internet shell that enabled the theft of machine keys and chronic entry to the compromised system. 

“With the fast adoption of those exploits, Microsoft assesses with excessive confidence that menace actors will proceed to combine them into their assaults in opposition to unpatched on-premises SharePoint techniques,” Microsoft mentioned.Commercial. Scroll to proceed studying.

Whereas Microsoft has shared some info on who was behind the zero-day assaults, its weblog publish brings additional confusion by way of which vulnerabilities have been exploited.

ToolShell is the identify assigned to 2 SharePoint vulnerabilities, CVE-2025-49706 (spoofing situation) and CVE-2025-49704 (distant code execution flaw), whose existence was reported to Microsoft in Could by researchers on the Pwn2Own Berlin hacking competitors. 

Microsoft mounted CVE-2025-49706 and CVE-2025-49704 with its July 2025 Patch Tuesday updates, and some days later different researchers reproduced the exploit chain and dubbed it ToolShell.

When information of zero-day assaults broke, it had been reported by Microsoft and others that menace actors had focused CVE-2025-53770, a CVE assigned to handle a possible bypass of CVE-2025-49704. As well as, Microsoft assigned CVE-2025-53771 to handle a bypass of CVE-2025-49706. The brand new CVEs have been patched in impacted SharePoint variations in current days.

Microsoft’s newest weblog publish says the assaults performed by the Chinese language hackers exploited CVE-2025-49706 and CVE-2025-49704 and doesn’t clearly state that CVE-2025-53770 and CVE-2025-53771 have additionally been exploited.

Some cybersecurity companies counsel that they’ve seen assaults chaining CVE-2025-53770 and CVE-2025-53771, whereas others, together with Microsoft, have failed to substantiate chaining. 

On the time of writing, Microsoft’s official advisories solely checklist CVE-2025-53770 as being exploited, whereas CVE-2025-49706, CVE-2025-49704 and CVE-2025-53771 are usually not flagged as exploited within the wild. 

As well as, Microsoft’s newest weblog publish signifies that CVE-2025-53770 permits each authentication bypass and distant code execution, which might counsel that CVE-2025-53771 just isn’t wanted for an exploit chain. 

The one cybersecurity agency that up to now has confirmed for SecurityWeek that CVE-2025-53770 and CVE-2025-53771 have been chained in ToolShell assaults is WatchTowr.

The corporate not solely confirmed chaining, however on Tuesday reported that it had discovered a method to exploit CVE-2025-53770 in a method that bypasses Antimalware Scan Interface (AMSI), the mitigation really helpful by Microsoft to clients who can not instantly apply the patches. This was additionally the mitigation really helpful earlier than patches have been launched for CVE-2025-53770 and CVE-2025-53771.

“AMSI was by no means a silver bullet, and this final result was inevitable. However we’re involved to listen to that some organizations are selecting to ‘allow AMSI’ as an alternative of patching. This can be a very unhealthy concept,” mentioned WatchTowr CEO Benjamin Harris.

“Now that exploitation has been linked to nation-state actors, it could be naive to suppose they might leverage a SharePoint zero-day however one way or the other not bypass AMSI. Organizations should patch. Ought to go with out saying – all the general public PoCs will set off AMSI, and mislead organizations into believing the mitigations are complete/the host is now not weak. This might be incorrect,” Harris added.

Greater than 9,000 SharePoint situations have been uncovered to the net when information of the assaults broke, and a whole lot of them have been focused within the first days. 

Associated: Microsoft Patches ‘ToolShell’ Zero-Days Exploited to Hack SharePoint Servers

Associated: ToolShell Zero-Day Assaults on SharePoint: First Wave Linked to China, Hit Excessive-Worth Targets

Security Week News Tags:APTs, Chinese, Exploited, Microsoft, Patch, ToolShell, Weeks, ZeroDays

Post navigation

Previous Post: Dark Web Travel Agencies Offering Cheap Travel Deals to Steal Credit Card Data
Next Post: New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware

Related Posts

Facial Recognition’s Trust Problem – SecurityWeek Facial Recognition’s Trust Problem – SecurityWeek Security Week News
Hackers Earn Over 0,000 on First Day of Pwn2Own Ireland 2025 Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025 Security Week News
In Other News: Microsoft Finds AMD CPU Flaws, ZuRu macOS Malware Evolves, DoNot APT Targets Govs In Other News: Microsoft Finds AMD CPU Flaws, ZuRu macOS Malware Evolves, DoNot APT Targets Govs Security Week News
Resemble AI Raises  Million for AI Threat Detection Resemble AI Raises $13 Million for AI Threat Detection Security Week News
Instagram Fixes Password Reset Vulnerability Amid User Data Leak Instagram Fixes Password Reset Vulnerability Amid User Data Leak Security Week News
Echo Raises M in Seed Funding for Vulnerability-Free Container Images Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Fixes 59 Security Flaws, Including Six Critical Zero-Days
  • Coinbase Cartel’s Data Theft Tactics Threaten High-Value Industries
  • Intel and AMD Patch Over 80 Vulnerabilities in February
  • Six New Microsoft Vulnerabilities Added to CISA’s KEV List
  • Fortinet Addresses Critical Security Flaws in Latest Update

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Fixes 59 Security Flaws, Including Six Critical Zero-Days
  • Coinbase Cartel’s Data Theft Tactics Threaten High-Value Industries
  • Intel and AMD Patch Over 80 Vulnerabilities in February
  • Six New Microsoft Vulnerabilities Added to CISA’s KEV List
  • Fortinet Addresses Critical Security Flaws in Latest Update

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark