Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

China-Based Threat Actor Involved In Microsoft SharePoint Attacks: Mandiant CTO

CRN by CRN
July 22, 2025
Home News
Share on FacebookShare on Twitter


While multiple attackers are now actively exploiting vulnerable on-premises SharePoint servers, Google Cloud-owned Mandiant assesses that ‘at least one’ is based in China.

Among the attackers now actively exploiting vulnerable on-premises Microsoft SharePoint servers, at least one has shown indications of originating from China, according to the assessment of Mandiant researchers.

The ongoing wave of attacks, known as “ToolShell,” has involved exploitation of a critical zero-day vulnerability in on-premises Microsoft SharePoint Server systems. Researchers have estimated that at least several hundred organizations have been compromised so far, reportedly including U.S. government agencies, educational institutions and organizations that manage critical infrastructure.

[Related: ‘Patching Is Not Enough’ With Microsoft SharePoint Server Attacks: Experts]

Charles Carmakal, CTO at Google Cloud-owned Mandiant Consulting, disclosed Monday that while multiple threat actors have been involved in the compromises so far, indications of involvement originating from China have been observed.

“We assess that at least one of the actors responsible for this early exploitation is a China-nexus threat actor,” Carmakal said in a statement provided by email.

“It’s critical to understand that multiple actors are now actively exploiting this vulnerability,” he said in the statement. “We fully anticipate that this trend will continue, as various other threat actors, driven by diverse motivations, will leverage this exploit as well.”

In addition to nation-state attackers, security researchers suggested to CRN Monday that it’s likely that financially motivated threat actors are also seeking to exploit the critical SharePoint vulnerability.

The “ToolShell” cyberattack campaign involves exploitation of on-premises Microsoft SharePoint Servers using a critical-severity remote code execution vulnerability (tracked at CVE-2025-53770) chained to a spoofing vulnerability (tracked at CVE-2025-53771).

Microsoft has released emergency patches to address the vulnerabilities in the SharePoint Server Subscription Edition and SharePoint Server 2019.

As of this writing, patches were not yet available for Microsoft SharePoint Server 2016. The company said in the customer guidance advisory that it is working on the SharePoint Server 2016 fixes.

The flaws do not impact SharePoint Online in Microsoft 365, Microsoft has said.

In its customer guidance advisory posted online, Microsoft called it “critical” that customers rotate their SharePoint server keys, known as ASP.NET machine keys, in addition to patching.

“If you don’t rotate those keys, even if you patch the server, then that attacker still has access,” said Nick Hyatt, senior threat intelligence analyst at GuidePoint Security, in an interview with CRN Monday.

A researcher at cybersecurity vendor watchTowr, Ryan Dewhurst, said in an email to CRN Monday that the attacks have led to “widespread impact across hundreds of organizations—including those that many would consider ‘incredibly sensitive.’”

“We’re fairly certain it’s for once acceptable to call this a close-to-worst-case scenario,” said Dewhurst, head of proactive threat intelligence at watchTowr, in the email.

Attacks have been underway since at least July 17, with most of the activity impacting the U.S., Germany, France and Australia, he said.



Source link

Tags: CyberattacksCybersecurityMicrosoft SecurityServersVulnerabilities
CRN

CRN

Next Post
KORE to Report Second Quarter 2025 Results on August 14, 2025

KORE to Report Second Quarter 2025 Results on August 14, 2025

Recommended.

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers

October 6, 2025
Stocks making the biggest moves midday: Tesla, Azek, Visa, Boeing and more

Stocks making the biggest moves midday: Tesla, Azek, Visa, Boeing and more

March 24, 2025

Trending.

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

July 18, 2025
Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

September 4, 2025
Wesco Declares Quarterly Dividend on Common Stock

Wesco Declares Quarterly Dividend on Common Stock

December 1, 2025
⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

March 10, 2025
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

February 9, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio