Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Allianz Life says “majority” of customer personal data stolen in a cyber attack

Tesla wants to bring Robotaxis to San Francisco. This is what gets in the way.

Meta name Shengjia Zhao as Chief Scientist of AI Superintelligence Unit

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Storm-2603 exploits a flaw in SharePoint to deploy Warlock ransomware on unearned systems
Identity

Storm-2603 exploits a flaw in SharePoint to deploy Warlock ransomware on unearned systems

userBy userJuly 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 24, 2025Ravi LakshmananVulnerability/Ransomware

Warlock ransomware

Microsoft has revealed that one of the threat actors behind the aggressive exploitation of SharePoint flaws is deploying Warlock ransomware on target systems.

The tech giant said in an update shared on Wednesday that the findings are based on “analysis and increased threat intelligence from continuous surveillance of Storm-2603’s exploitation activities.”

The threat actors due to financially motivated activities are suspected of being a China-based threat actor who has been known to drop warlocks and rock bit ransomware in the past.

The attack chain involves exploitation of CVE-2025-49706, a spoofing vulnerability, and CVE-2025-49704, a remote code execution vulnerability, targeting an accrued on-premises SharePoint server to deploy a spinstall 0.aspx web shell payload.

Cybersecurity

“This initial access is used to run command execution using the W3WP.EXE process that supports SharePoint,” Microsoft said. “Storm-2603 starts a set of discovery commands, including Whoami, to enumerate the user’s context and verify the privilege level.”

Attacks are characterized by using CMD.exe and batch scripts when threat actors dig deep into the target network, but Services.exe is abused to change the Windows registry to turn off Microsoft Defender protection.

In addition to leverage to continue Spinstall0.aspx, it has been observed that Storm-2603 creates scheduled tasks and modifys Internet Information Services (IIS) components to launch what Microsoft described as a suspicious .NET assembly. These actions are designed to ensure continuous access, even when victims take steps to connect the initial access vector.

Other notable aspects of the attack include the deployment of Mimikats to target local security station subsystem services (LSASS) memory to harvest credentials, followed by lateral movements using PSEXEC and Impacket Toolkit.

“We’re observing Storm-2603 modifying Group Policy Objects (GPOs) to distribute Warlock ransomware in compromised environments,” Microsoft said.

Warlock ransomware

As a mitigation, users are advised to follow the steps below –

Upgrading to a supported version of on-premises version Upgrading to a supported version of Microsoft SharePoint Server Apply the latest security updates Apply the latest security updates by applying the latest security updates to ensure that the anti-malware scan interface is turned on and that you correctly deploy Microsoft Defenderdenderdderd on the endpoint. Implement an incident response plan (after installing new security updates)

Cybersecurity

The development has already claimed at least 400 victims as the SharePoint server flaws are under massive exploitation. Linen Timpon (aka APT27) and Violet Typhoon (aka APT31) are two other Chinese hacking groups linked to malicious activities. China has denied the allegations.

“Cybersecurity is a common challenge facing all countries and needs to be addressed jointly through dialogue and cooperation,” said Guo Jiakun, spokesman for China’s Ministry of Foreign Affairs. “China will oppose and fight against hacking activities according to the law, and at the same time oppose smears and attacks against China under the excuses of cybersecurity issues.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBurial of a tall warrior from 3,800 years old, buried in four tapered areas excavated in Azerbaijan
Next Article £30 million for green fuels and technology for decarbonized transport
user
  • Website

Related Posts

N. The US sanctions company behind the Korean IT scheme. Arizona woman was jailed to run a laptop farm

July 25, 2025

Patchwork targets Turkish defense companies with spear phishing using malicious LNK files

July 25, 2025

Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor

July 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Allianz Life says “majority” of customer personal data stolen in a cyber attack

Tesla wants to bring Robotaxis to San Francisco. This is what gets in the way.

Meta name Shengjia Zhao as Chief Scientist of AI Superintelligence Unit

Sam Altman warns that ChatGpt is not legally confidential when using it as a therapist

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.