Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

Vimeo is acquired by bending a spoon in a $1.38 billion all-cash transaction

Chillyhell Macos backdoor and Zinorrat rats threaten Macos, Windows and Linux Systems

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft Link Exploits to 3 Chinese Hacker Groups in SharePoint ongoing
Identity

Microsoft Link Exploits to 3 Chinese Hacker Groups in SharePoint ongoing

userBy userJuly 22, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 22, 2025Ravi LakshmananVulnerability/Threat Intelligence

Continuous SharePoint Exploits

On July 7, 2025, Microsoft officially linked the exploitation of security flaws in SharePoint Server instances for the Internet to two Chinese hacking groups called Linen Typhoon and Violet Typhoon, supporting an early report.

Tech Giant also observed a third China-based threat actor tracking Storm-2603, saying it would weaponize the flaws to gain early access to the target organization.

“With the rapid adoption of these exploits, Microsoft is confident that threat actors will continue to integrate them into attacks against unpaid on-premises SharePoint systems,” Tech Giant said in a report released today.

Cybersecurity

A brief description of the threat activity cluster can be found below –

Linen typens (aka APT27, Bronze Union, Emily Panda, Iodine, Lucky Mouse, Red Phoenix, and UNC215) were attributed to malware families such as Sysupdate, Hyperbro, Hyperbro, and Plugx Violet Typhoon before 2012. It has been active since 2015 and was previously attributed to attacks targeting Storm-2603 in the US, Finland and Czech Republic.

The vulnerabilities affecting on-premises SharePoint servers have been found to take advantage of the incomplete fixes for the spoofing flaw CVE-2025-49706 and the remote code execution bug CVE-2025-49704. The bypass is assigned CVE-2025-53771 and CVE-2025-53770, respectively.

The attack observed by Microsoft found that threat actors were using on-premises SharePoint servers via POST requests to tool pen endpoints. This results in authentication bypassing and remote code execution.

As revealed by other cybersecurity vendors, the infectious disease chain paves the way for the deployment of a web shell named “Spinstall0.aspx” (also known as Spinstall.aspx, Spinstall1.aspx, or Spinstall2.aspx), where enemies can retrieve and steal machine data.

Cybersecurity

To mitigate the risk poses by threats, it is essential that users apply the latest updates for SharePoint Server Subscription Edition, SharePoint Server 2019, and SharePoint Server 2016, and deploy SharePoint Server ASP.NET Machine Keys, RestArt Internet Information Services (IIS), and Microsoft Defender for EndPoint or equivalent solutions.

We also recommend integrating and enabling the anti-malware scan interface (AMSI) and Microsoft Defender (or similar solution) for all on-premises SharePoint deployments, and configuring AMSI to enable Full Mode.

“Additional actors can use these exploits to target unpublished SharePoint systems and further highlight the need for organizations to implement mitigation and security updates immediately,” Microsoft said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe return of wolves to Yellowstone led to a surge in invisible aspen trees for 80 years
Next Article Students build a new “hybrid drone” – see it fly in the air and then dive seamlessly underwater
user
  • Website

Related Posts

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

September 10, 2025

Chillyhell Macos backdoor and Zinorrat rats threaten Macos, Windows and Linux Systems

September 10, 2025

Microsoft fixes 80 defects – including SMB PrivesC and Azure CVSS 10.0 bugs

September 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

Vimeo is acquired by bending a spoon in a $1.38 billion all-cash transaction

Chillyhell Macos backdoor and Zinorrat rats threaten Macos, Windows and Linux Systems

Microsoft fixes 80 defects – including SMB PrivesC and Azure CVSS 10.0 bugs

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

Wearable Tech Deep Dive: The Science Behind Smartwatches and Your Health Goals

The Adaptable Healthcare Playbook: How TwinH Is Leading the Way

Smart Health, Seamless Integration: GooApps Leads the Way in 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.