Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

iOS 26 Beta 4 has arrived, with liquid glass adjustments and AI news summary

Microsoft Link Exploits to 3 Chinese Hacker Groups in SharePoint ongoing

The return of wolves to Yellowstone led to a surge in invisible aspen trees for 80 years

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft Link Exploits to 3 Chinese Hacker Groups in SharePoint ongoing
Identity

Microsoft Link Exploits to 3 Chinese Hacker Groups in SharePoint ongoing

userBy userJuly 22, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 22, 2025Ravi LakshmananVulnerability/Threat Intelligence

Continuous SharePoint Exploits

On July 7, 2025, Microsoft officially linked the exploitation of security flaws in SharePoint Server instances for the Internet to two Chinese hacking groups called Linen Typhoon and Violet Typhoon, supporting an early report.

Tech Giant also observed a third China-based threat actor tracking Storm-2603, saying it would weaponize the flaws to gain early access to the target organization.

“With the rapid adoption of these exploits, Microsoft is confident that threat actors will continue to integrate them into attacks against unpaid on-premises SharePoint systems,” Tech Giant said in a report released today.

Cybersecurity

A brief description of the threat activity cluster can be found below –

Linen typens (aka APT27, Bronze Union, Emily Panda, Iodine, Lucky Mouse, Red Phoenix, and UNC215) were attributed to malware families such as Sysupdate, Hyperbro, Hyperbro, and Plugx Violet Typhoon before 2012. It has been active since 2015 and was previously attributed to attacks targeting Storm-2603 in the US, Finland and Czech Republic.

The vulnerabilities affecting on-premises SharePoint servers have been found to take advantage of the incomplete fixes for the spoofing flaw CVE-2025-49706 and the remote code execution bug CVE-2025-49704. The bypass is assigned CVE-2025-53771 and CVE-2025-53770, respectively.

The attack observed by Microsoft found that threat actors were using on-premises SharePoint servers via POST requests to tool pen endpoints. This results in authentication bypassing and remote code execution.

As revealed by other cybersecurity vendors, the infectious disease chain paves the way for the deployment of a web shell named “Spinstall0.aspx” (also known as Spinstall.aspx, Spinstall1.aspx, or Spinstall2.aspx), where enemies can retrieve and steal machine data.

Cybersecurity

To mitigate the risk poses by threats, it is essential that users apply the latest updates for SharePoint Server Subscription Edition, SharePoint Server 2019, and SharePoint Server 2016, and deploy SharePoint Server ASP.NET Machine Keys, RestArt Internet Information Services (IIS), and Microsoft Defender for EndPoint or equivalent solutions.

We also recommend integrating and enabling the anti-malware scan interface (AMSI) and Microsoft Defender (or similar solution) for all on-premises SharePoint deployments, and configuring AMSI to enable Full Mode.

“Additional actors can use these exploits to target unpublished SharePoint systems and further highlight the need for organizations to implement mitigation and security updates immediately,” Microsoft said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe return of wolves to Yellowstone led to a surge in invisible aspen trees for 80 years
Next Article iOS 26 Beta 4 has arrived, with liquid glass adjustments and AI news summary
user
  • Website

Related Posts

Cisco checks active exploits targeting defects in ISE and allows for unrecognized root access

July 22, 2025

Allakore, Purerat and Hijack Loader’s stolen qualifications and remote access to grow

July 22, 2025

How to proceed from SOC Manager to CISO?

July 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

iOS 26 Beta 4 has arrived, with liquid glass adjustments and AI news summary

Microsoft Link Exploits to 3 Chinese Hacker Groups in SharePoint ongoing

The return of wolves to Yellowstone led to a surge in invisible aspen trees for 80 years

Google and Microsoft say Chinese hackers are using SharePoint Zero-Day

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.