Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Ukraine aid group targeted through fake Zoom meetings and weaponized PDF files

UK recognizes Apple, Google as having ‘strategic market positions’, opening door to further regulation

GM’s internal reforms will focus on AI and autonomous driving

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Weeks after Microsoft’s July patch, Chinese attackers exploit ToolShell SharePoint flaw
Identity

Weeks after Microsoft’s July patch, Chinese attackers exploit ToolShell SharePoint flaw

userBy userOctober 22, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 22, 2025Ravi LakshmananCyber ​​espionage/vulnerabilities

After being published and patched in July 2025, Chinese-linked attackers exploited the ToolShell security vulnerability in Microsoft SharePoint to infiltrate telecommunications companies in the Middle East.

In addition to government agencies in African countries, government agencies in South America and universities in the United States were also targeted, as well as national technology institutions in Africa, government agencies in the Middle East, and financial companies in European countries.

According to Broadcom’s Symantec Threat Hunter Team, this attack included an exploitation of CVE-2025-53770. CVE-2025-53770 is a currently patched security flaw in on-premises SharePoint servers that can be used to bypass authentication and execute remote code.

DFIR retainer service

CVE-2025-53770 is assessed to be a patch bypass for CVE-2025-49704 and CVE-2025-49706, and has been weaponized as a zero-day by three Chinese threat groups, including Linen Typhoon (aka Budworm), Violet Typhoon (aka Sheathminer), and Storm 2603, the latter in recent months. Warlock, LockBit, and Babuk ransomware families.

However, Symantec’s latest findings indicate that a much wider range of Chinese attackers are exploiting this vulnerability. This includes Salt Typhoon (also known as Glowworm), a hacker group that is said to have exploited flaws in ToolShell to deploy tools such as Zingdoor, ShadowPad, and KrustyLoader against telecommunications operators and two government agencies in Africa.

KrustyLoader, first detailed by Synacktiv in January 2024, is a Rust-based loader previously used by a Chinese-aligned spy group known as UNC5221 in attacks that exploited flaws in Ivanti Endpoint Manager Mobile (EPMM) and SAP NetWeaver.

Meanwhile, attacks targeting government agencies in South America and universities in the United States leveraged unspecified vulnerabilities to gain initial access, then exploited SQL servers and Apache HTTP servers running Adobe ColdFusion software to deliver malicious payloads using DLL sideloading techniques.

CIS build kit

In some incidents, attackers have been observed running exploits of CVE-2021-36942 (also known as PetitPotam) for privilege escalation and domain compromise, as well as a number of readily available living-off-the-land (LotL) tools that facilitate scanning, file downloads, and credential theft on infected systems.

“There are some overlaps between this activity and activity previously attributed to glow worms in the types of victims and some of the tools used,” Symantec said. “However, while there is not enough evidence to conclusively link this activity to any specific group, all evidence points to the people behind this activity being China-based threat actors.”

“The activity conducted on the targeted networks indicates that the attackers were interested in stealing credentials and establishing persistent and stealth access to the victim’s network, likely for espionage purposes.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleClosing the remediation gap: Introducing Penera Resolve
Next Article London air pollution significantly reduced after ULEZ launch
user
  • Website

Related Posts

Ukraine aid group targeted through fake Zoom meetings and weaponized PDF files

October 22, 2025

Closing the remediation gap: Introducing Penera Resolve

October 22, 2025

Fake Nethereum NuGet package uses homoglyph trick to steal crypto wallet keys

October 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Ukraine aid group targeted through fake Zoom meetings and weaponized PDF files

UK recognizes Apple, Google as having ‘strategic market positions’, opening door to further regulation

GM’s internal reforms will focus on AI and autonomous driving

Samsung takes on Apple’s Vision Pro with new Galaxy XR headset

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.