Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch

Posted on October 22, 2025October 22, 2025 By CWS

Oct 22, 2025Ravie LakshmananCyber Espionage / Vulnerability
Menace actors with ties to China exploited the ToolShell safety vulnerability in Microsoft SharePoint to breach a telecommunications firm within the Center East after it was publicly disclosed and patched in July 2025.
Additionally focused have been authorities departments in an African nation, in addition to authorities companies in South America, a college within the U.S., in addition to seemingly a state know-how company in an African nation, a authorities division within the Center East, and a finance firm in a European nation.
In keeping with Broadcom’s Symantec Menace Hunter Workforce, the assaults concerned the exploitation of CVE-2025-53770, a now-patched safety flaw in on-premise SharePoint servers that could possibly be used to bypass authentication and obtain distant code execution.

CVE-2025-53770, assessed to be a patch bypass for CVE-2025-49704 and CVE-2025-49706, has been weaponized as a zero-day by three Chinese language menace teams, together with Linen Hurricane (aka Budworm), Violet Hurricane (aka Sheathminer), and Storm-2603, the latter of which is linked to the deployment of Warlock, LockBit, and Babuk ransomware households in latest months.
Nonetheless, the most recent findings from Symantec point out {that a} a lot wider vary of Chinese language menace actors have abused the vulnerability. This contains the Salt Hurricane (aka Glowworm) hacking group, which is claimed to have leveraged the ToolShell flaw to deploy instruments like Zingdoor, ShadowPad, and KrustyLoader in opposition to the telecom entity and the 2 authorities our bodies in Africa.
KrustyLoader, first detailed by Synacktiv in January 2024, is a Rust-based loader beforehand put to make use of by a China-nexus espionage group dubbed UNC5221 in assaults exploiting flaws in Ivanti Endpoint Supervisor Cell (EPMM) and SAP NetWeaver.
The assaults aimed toward authorities companies in South America and a college within the U.S., then again, concerned the usage of unspecified vulnerabilities to acquire preliminary entry, adopted by the exploitation of SQL servers and Apache HTTP servers working the Adobe ColdFusion software program to ship the malicious payloads utilizing DLL side-loading strategies.

In a number of the incidents, the attackers have been noticed executing an exploit for CVE-2021-36942 (aka PetitPotam) for privilege escalation and area compromise, together with plenty of available and living-off-the-land (LotL) instruments to facilitate scanning, file obtain, and credential theft on the contaminated programs.
“There may be some overlap within the sorts of victims and a number of the instruments used between this exercise and exercise beforehand attributed to Glowworm,” Symantec mentioned. “Nonetheless, we would not have ample proof to conclusively attribute this exercise to at least one particular group, although we are able to say that every one proof factors to these behind it being China-based menace actors.”
“The exercise carried out on focused networks signifies that the attackers have been all for stealing credentials and in establishing persistent and stealthy entry to sufferer networks, seemingly for the aim of espionage.”

The Hacker News Tags:Actors, Chinese, Exploit, Flaw, July, Microsofts, Patch, SharePoint, Threat, ToolShell, Weeks

Post navigation

Previous Post: Keycard Emerges From Stealth Mode With $38 Million in Funding
Next Post: Chinese Hackers Using ToolShell Vulnerability To Compromise Networks Of Government Agencies

Related Posts

Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar The Hacker News
The Costly Confusion Behind Security Risks The Hacker News
A Healthcare CISO’s Journey to Enabling Modern Care The Hacker News
Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers The Hacker News
Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign The Hacker News
AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • aiFWall Emerges from Stealth With an AI Firewall
  • LastPass Users Targeted With Backup-Themed Phishing Emails
  • AI Phishing Is Your Company’s Biggest Security Risk in 2026
  • NVIDIA NSIGHT Graphics for Linux Vulnerability Allows Code Execution Attacks
  • Why Identity Security Must Move Beyond MFA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • aiFWall Emerges from Stealth With an AI Firewall
  • LastPass Users Targeted With Backup-Themed Phishing Emails
  • AI Phishing Is Your Company’s Biggest Security Risk in 2026
  • NVIDIA NSIGHT Graphics for Linux Vulnerability Allows Code Execution Attacks
  • Why Identity Security Must Move Beyond MFA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark