Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

UK Moves to Curb Ransomware Payments by Public Sector

July 23, 2025

Major European Healthcare Network Faces Security Breach

July 22, 2025

Urgent Alert: Ransomware Attacks on the Rise

July 22, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » Microsoft Links Ongoing SharePoint Exploits to Chinese Hacker Groups
Cyberattacks

Microsoft Links Ongoing SharePoint Exploits to Chinese Hacker Groups

Staff WriterBy Staff WriterJuly 22, 2025No Comments3 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Top Highlights

  1. Microsoft links security flaws in SharePoint Server to three Chinese hacking groups—Linen Typhoon, Violet Typhoon, and Storm-2603—highlighting an ongoing threat to unpatched systems.

  2. The vulnerabilities exploit incomplete fixes for critical flaws (CVE-2025-49706 and CVE-2025-49704), enabling authentication bypass and remote code execution via POST requests to the ToolPane endpoint.

  3. Attackers deploy a web shell named "spinstall0.aspx" to steal sensitive data, using techniques to blend malicious traffic with legitimate update traffic, complicating detection.

  4. Urgent mitigation steps include applying latest SharePoint updates, rotating machine keys, utilizing Microsoft Defender, and enabling AMSI to prevent exploitation by additional threat actors.

Key Challenge

On July 22, 2025, Microsoft publicly attributed a series of cyberattacks exploiting vulnerabilities in on-premises SharePoint Server instances to three China-based hacking groups: Linen Typhoon, Violet Typhoon, and a newly recognized entity, Storm-2603. These groups have a history of sophisticated cyber operations, with Linen Typhoon operational since 2012 and Violet Typhoon since 2015. The attacks stemmed from the exploitation of security flaws—specifically the spoofing vulnerability CVE-2025-49706 and the remote code execution flaw CVE-2025-49704—where hackers utilized crafted POST requests to bypass authentication and deploy malicious web shells, such as “spinstall0.aspx,” which facilitated the exfiltration of sensitive data.

Rakesh Krishnan, a notable cybersecurity researcher, reported on the complex behavior exhibited by these attacks, detailing how the hacking entities employed multiple processes within Microsoft Edge to mask their malicious actions. Microsoft’s advisory underscores the urgency for organizations to apply security updates, rotate machine keys, and adopt additional protective measures, given the high likelihood of continued exploitation against unpatched SharePoint systems. This report not only highlights a significant security concern involving well-documented Chinese threat actors but also parallels previous incidents like the 2021 Silk Typhoon campaign, illustrating an ongoing trend in targeting Microsoft products for cyber offensives.

Critical Concerns

The recent exploitation of vulnerabilities in on-premises SharePoint Server instances by Chinese hacking groups poses significant risks to other businesses, users, and organizations due to their potential for widespread compromise. As these threat actors, notably Linen Typhoon and Violet Typhoon, actively weaponize these flaws, they create a cascading threat environment where unpatched systems become prime targets, subsequently leading to data breaches and operational disruptions. Organizations that fail to promptly implement security updates or mitigate these vulnerabilities risk not only compromising their proprietary information but also jeopardizing their reputations, as interconnected supply chains and partnerships may inadvertently be affected. This ripple effect can undermine consumer trust and lead to substantial financial ramifications, further emphasizing the urgency for comprehensive cybersecurity measures across all affected entities. Thus, the interconnected nature of modern digital infrastructure necessitates immediate preventative action to safeguard against the ramifications of such targeted cyber threats.

Possible Actions

The urgency of addressing vulnerabilities in software frameworks cannot be overstated, particularly when they are linked to nefarious entities like hacking groups. This has profound implications not only for individual organizations but also for broader cybersecurity architecture.

Mitigation Steps

  • Apply Security Updates
  • Enhance Network Monitoring
  • Perform Vulnerability Assessments
  • Implement Access Controls
  • Educate Employees
  • Strengthen Incident Response

NIST CSF Guidance
The NIST Cybersecurity Framework (CSF) underscores the criticality of proactive risk management and timely remediation of identified vulnerabilities. Organizations should reference NIST Special Publication 800-53 for detailed guidelines on safeguarding information systems against such threats.

Continue Your Cyber Journey

Discover cutting-edge developments in Emerging Tech and industry Insights.

Understand foundational security frameworks via NIST CSF on Wikipedia.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1

CISO Update computer security cyber attacks cyber news cyber security news cyber security news today cyber security updates cyber updates Cybersecurity data breach hacker news hacking news how to hack information security MX1 network security ransomware malware software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDell Declares Data Leak a Hoax
Next Article Chinese APTs Exploit ToolShell Zero-Days Ahead of Patch
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

UK Moves to Curb Ransomware Payments by Public Sector

July 23, 2025

Major European Healthcare Network Faces Security Breach

July 22, 2025

Urgent Alert: Ransomware Attacks on the Rise

July 22, 2025

Comments are closed.

Latest Posts

UK Moves to Curb Ransomware Payments by Public Sector

July 23, 20250 Views

Major European Healthcare Network Faces Security Breach

July 22, 20250 Views

Urgent Alert: Ransomware Attacks on the Rise

July 22, 20250 Views

Lumma Infostealer Malware Reemerges After Major Disruption

July 22, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

UK Moves to Curb Ransomware Payments by Public Sector

July 23, 2025

Major European Healthcare Network Faces Security Breach

July 22, 2025

Urgent Alert: Ransomware Attacks on the Rise

July 22, 2025
Most Popular

Designing and Building Defenses for the Future

February 13, 202515 Views

United Natural Foods Faces Cyberattack Disruption

June 10, 20257 Views

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.