Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Storm-2603 Exploits SharePoint Flaws to Deploy Warlock Ransomware on Unpatched Systems

Posted on July 24, 2025July 24, 2025 By CWS

Jul 24, 2025Ravie LakshmananVulnerability / Ransomware
Microsoft has revealed that one of many menace actors behind the lively exploitation of SharePoint flaws is deploying Warlock ransomware on focused techniques.
The tech large, in an replace shared Wednesday, stated the findings are primarily based on an “expanded evaluation and menace intelligence from our continued monitoring of exploitation exercise by Storm-2603.”
The menace actor attributed to the financially motivated exercise is a suspected China-based menace actor that is identified to drop Warlock and LockBit ransomware previously.
The assault chains entail the exploitation of CVE-2025-49706, a spoofing vulnerability, and CVE-2025-49704, a distant code execution vulnerability, focusing on unpatched on-premises SharePoint servers to deploy the spinstall0.aspx net shell payload.

“This preliminary entry is used to conduct command execution utilizing the w3wp.exe course of that helps SharePoint,” Microsoft stated. “Storm-2603 then initiates a sequence of discovery instructions, together with whoami, to enumerate person context and validate privilege ranges.”
The assaults are characterised by means of cmd.exe and batch scripts because the menace actor burrows deeper into the goal community, whereas providers.exe is abused to show off Microsoft Defender protections by modifying the Home windows Registry.
Along with leveraging spinstall0.aspx for persistence, Storm-2603 has been noticed creating scheduled duties and modifying Web Data Companies (IIS) parts to launch what Microsoft described as suspicious .NET assemblies. These actions are designed to make sure ongoing entry even when the victims take steps to plug the preliminary entry vectors.
A few of the different noteworthy features of the assaults embody the deployment of Mimikatz to reap credentials by focusing on the Native Safety Authority Subsystem Service (LSASS) reminiscence, after which continuing to conduct lateral motion utilizing PsExec and the Impacket toolkit.
“Storm-2603 is then noticed modifying Group Coverage Objects (GPO) to distribute Warlock ransomware in compromised environments,” Microsoft stated.

As mitigations, customers are urged to observe the steps beneath –

Improve to supported variations of on-premises Microsoft SharePoint Server
Apply the newest safety updates
Make sure the Antimalware Scan Interface is turned on and configured appropriately
Deploy Microsoft Defender for Endpoint, or equal options
Rotate SharePoint Server ASP.NET machine keys
Restart IIS on all SharePoint servers utilizing iisreset.exe (If AMSI can’t be enabled, it is suggested to rotate the keys and restart IIS after putting in the brand new safety replace)
Implement incident response plan

The event comes because the SharePoint Server flaws have come below large-scale exploitation, already claiming a minimum of 400 victims. Linen Hurricane (aka APT27) and Violet Hurricane (aka APT31) are two different Chinese language hacking teams which have been linked to the malicious exercise. China has denied the allegations.
“Cybersecurity is a standard problem confronted by all international locations and must be addressed collectively by dialogue and cooperation,” China’s Overseas Ministry Spokesperson Guo Jiakun stated. “China opposes and fights hacking actions in accordance with the regulation. On the identical time, we oppose smears and assaults in opposition to China below the excuse of cybersecurity points.”

The Hacker News Tags:Deploy, Exploits, Flaws, Ransomware, SharePoint, Storm2603, Systems, Unpatched, Warlock

Post navigation

Previous Post: GitLab Security Update – Patch for Multiple Vulnerabilities in Community and Enterprise Edition
Next Post: China-Based APTs Deploy Fake Dalai Lama Apps to Spy on Tibetan Community

Related Posts

Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims The Hacker News
Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist The Hacker News
Beyond Vulnerability Management – Can You CVE What I CVE? The Hacker News
Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild The Hacker News
The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats The Hacker News
Overcoming Risks from Chinese GenAI Tool Usage The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News