Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Microsoft SharePoint Server Attacks Are ‘Close-To-Worst-Case Scenario’: Researcher

CRN by CRN
July 21, 2025
Home News
Share on FacebookShare on Twitter


Cyberattacks exploiting zero-day vulnerabilities in on-premises SharePoint Servers have so far led to ‘widespread impact across hundreds of organizations,’ according to a researcher at cybersecurity vendor watchTowr.

The wave of cyberattacks exploiting zero-day vulnerabilities in on-premises Microsoft SharePoint Servers poses a massive risk to organizations that should be given the highest priority, according to a researcher at cybersecurity vendor watchTowr.

The “ToolShell” cyberattack campaign, which is reportedly ongoing, involves exploitation of a pair of vulnerabilities (tracked at CVE-2025-53770 and CVE-2025-53771) that impact on-premises Microsoft SharePoint Servers. Microsoft has made patches available for some of the affected versions of SharePoint Server, but not all impacted versions have available patches as of this writing.

[Related: Five Things To Know On Microsoft SharePoint Server ‘ToolShell’ Attacks]

The attacks quickly became “widespread” in part because the flaws are “trivial” to exploit and entail bypassing authentication, according to Ryan Dewhurst, head of proactive threat intelligence at watchTowr. In addition, the campaign has been targeting “critical software used by critical organizations and industries,” he said in an email statement provided to CRN.

Due to all these factors, “we’re fairly certain it’s for once acceptable to call this a close-to-worst-case scenario,” Dewhurst said in the statement Monday. “We spent the weekend trying to alert organizations to their exposure, and in some cases, were forced to watch them get compromised in real-time.”

So far, researchers at watchTowr have seen “widespread impact across hundreds of organizations—including those that many would consider ‘incredibly sensitive,’” he said in the email statement. Those include government organizations and educational institutions, as well as organizations that manage critical infrastructure.

Attacks have been underway since at least July 17, with the U.S., Germany, France and Australia “currently bearing the brunt of exploitation activity,” Dewhurst said in the statement.

“The sad reality is that we’ll see this vulnerability exploited long into the future as organizations fail to patch or as attackers return to regain access after stealing cryptographic keys as has been seen heavily in activity this weekend,” he said.

The attacks are believed to have compromised victims including U.S. government agencies as well as state agencies, universities and corporations, according to a report from T he Washington Post.

In response to an email from CRN seeking further comment Monday, Microsoft referred to a customer guidance advisory posted online.

Microsoft said in the advisory that it “is aware of active attacks targeting on-premises SharePoint Server customers” through exploitation of the zero-day vulnerabilities tracked at CVE-2025-53770 and CVE-2025-53771.

Microsoft has released emergency patches to address the vulnerabilities in the SharePoint Server Subscription Edition and SharePoint Server 2019.

“Customers should apply these updates immediately to ensure they’re protected,” Microsoft said in its customer guidance advisory.

However, as of this writing, patches were not yet available for Microsoft SharePoint Server 2016. The company said in the advisory that it is working on the SharePoint Server 2016 fixes.

The flaws only affect on-premises SharePoint Servers and do not impact SharePoint Online in Microsoft 365, Microsoft noted.

Organizations that have had on-premises SharePoint Servers exposed to the internet should proceed as if their systems are compromised, according to threat experts.

“If you have SharePoint on-prem exposed to the internet, you should assume that you have been compromised at this point,” said Michael Sikorski, CTO and head of threat intelligence at Palo Alto Networks’ Unit 42, in an email statement provided to CRN. “Patching alone is insufficient to fully evict the threat.”

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said in an advisory that exploitation of the remote code execution vulnerability tracked at CVE-2025-53770 has been “enabling unauthorized access to on-premise SharePoint servers” for threat actors.

The exploitation activity “provides unauthenticated access to systems and enables malicious actors to fully access SharePoint content, including file systems and internal configurations, and execute code over the network,” CISA said in the advisory.



Source link

Tags: CyberattacksCybersecurityMicrosoft SecurityServersVulnerabilities
CRN

CRN

Next Post
OpenText’s Mike DePalma On Channel Strategy: ‘We’re In Blitz Mode’

OpenText’s Mike DePalma On Channel Strategy: ‘We’re In Blitz Mode’

Recommended.

US Government Issues Advisory on Ransomware Group Blamed for Halliburton Cyberattack

US Government Issues Advisory on Ransomware Group Blamed for Halliburton Cyberattack

August 30, 2024
mobiQode Redefines Networking with Smart Digital Business Cards and Custom Landing Pages

mobiQode Redefines Networking with Smart Digital Business Cards and Custom Landing Pages

November 17, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio