Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch

Posted on October 22, 2025October 22, 2025 By CWS

Oct 22, 2025Ravie LakshmananCyber Espionage / Vulnerability
Menace actors with ties to China exploited the ToolShell safety vulnerability in Microsoft SharePoint to breach a telecommunications firm within the Center East after it was publicly disclosed and patched in July 2025.
Additionally focused have been authorities departments in an African nation, in addition to authorities companies in South America, a college within the U.S., in addition to seemingly a state know-how company in an African nation, a authorities division within the Center East, and a finance firm in a European nation.
In keeping with Broadcom’s Symantec Menace Hunter Workforce, the assaults concerned the exploitation of CVE-2025-53770, a now-patched safety flaw in on-premise SharePoint servers that could possibly be used to bypass authentication and obtain distant code execution.

CVE-2025-53770, assessed to be a patch bypass for CVE-2025-49704 and CVE-2025-49706, has been weaponized as a zero-day by three Chinese language menace teams, together with Linen Hurricane (aka Budworm), Violet Hurricane (aka Sheathminer), and Storm-2603, the latter of which is linked to the deployment of Warlock, LockBit, and Babuk ransomware households in latest months.
Nonetheless, the most recent findings from Symantec point out {that a} a lot wider vary of Chinese language menace actors have abused the vulnerability. This contains the Salt Hurricane (aka Glowworm) hacking group, which is claimed to have leveraged the ToolShell flaw to deploy instruments like Zingdoor, ShadowPad, and KrustyLoader in opposition to the telecom entity and the 2 authorities our bodies in Africa.
KrustyLoader, first detailed by Synacktiv in January 2024, is a Rust-based loader beforehand put to make use of by a China-nexus espionage group dubbed UNC5221 in assaults exploiting flaws in Ivanti Endpoint Supervisor Cell (EPMM) and SAP NetWeaver.
The assaults aimed toward authorities companies in South America and a college within the U.S., then again, concerned the usage of unspecified vulnerabilities to acquire preliminary entry, adopted by the exploitation of SQL servers and Apache HTTP servers working the Adobe ColdFusion software program to ship the malicious payloads utilizing DLL side-loading strategies.

In a number of the incidents, the attackers have been noticed executing an exploit for CVE-2021-36942 (aka PetitPotam) for privilege escalation and area compromise, together with plenty of available and living-off-the-land (LotL) instruments to facilitate scanning, file obtain, and credential theft on the contaminated programs.
“There may be some overlap within the sorts of victims and a number of the instruments used between this exercise and exercise beforehand attributed to Glowworm,” Symantec mentioned. “Nonetheless, we would not have ample proof to conclusively attribute this exercise to at least one particular group, although we are able to say that every one proof factors to these behind it being China-based menace actors.”
“The exercise carried out on focused networks signifies that the attackers have been all for stealing credentials and in establishing persistent and stealthy entry to sufferer networks, seemingly for the aim of espionage.”

The Hacker News Tags:Actors, Chinese, Exploit, Flaw, July, Microsofts, Patch, SharePoint, Threat, ToolShell, Weeks

Post navigation

Previous Post: Keycard Emerges From Stealth Mode With $38 Million in Funding
Next Post: Chinese Hackers Using ToolShell Vulnerability To Compromise Networks Of Government Agencies

Related Posts

Are Forgotten AD Service Accounts Leaving You at Risk? The Hacker News
Google Adds Multi-Layered Defenses to Secure GenAI from Prompt Injection Attacks The Hacker News
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery The Hacker News
Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider The Hacker News
Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner The Hacker News
Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark