Active SharePoint RCE Campaign — “ToolShell” Analysis | Author: CyberDudeBivash


Powered by: cyberdudebivash.com | cyberbivash.blogspot.com | cryptobivash.code.blog When SharePoint becomes a gateway — stopping ToolShell before access turns into ransomware.


What’s the Threat?

A critical on-premises SharePoint RCE campaign—codenamed “ToolShell”—is unfolding, leveraging multiple unauthenticated vulnerabilities to deliver ransomware and persistent malware:

  • Chain of Exploits:
    • CVE-2025-49704 – Code Injection
    • CVE-2025-49706 – Improper Authentication
    • CVE-2025-53770 – Deserialization-based RCE
    • CVE-2025-53771 – Path Traversal Bypass
      Recorded FutureFastlyBlack Kite
  • Active Exploitation:
    • Detected across thousands of on-prem SharePoint deployments since mid-July.
    • Threat actors stripping ASP.NET machine keys to maintain persistence, even post-patch.
      Recorded FutureUnit 42Centripetal
  • State-Aligned Adversaries:
    • Groups such as Storm-2603Linen Typhoon, and Violet Typhoon are behind these campaigns. They’re promoting Warlock ransomware post-compromise.
      MicrosoftTechRadar+1Tom’s Hardware
  • Scope of Impact:
    • Over 400 victimized SharePoint servers (e.g., NIH, DHS), with up to 9,000 still vulnerable globally.
      TechRadarIT Pro

Urgent Mitigation Checklist

Action AreaRecommended Measures
Patch ImmediatelyApply the July 2025 SharePoint security updates for Subscription, 2019, and 2016 editions. FastlyCybereason
Rotate Cryptographic KeysReset ASP.NET machineKey and restart all SharePointIIS instances. Recorded FutureWindows Central
Deploy Virtual PatchingUse WAF/NGWAF rules (e.g., Fastly template) to block ToolShell exploitation indicators like POST requests to ToolPane.aspxFastlyAkamai
Assume CompromiseHunt for IOCs like spinstall0.aspx, suspicious PowerShell downloads (e.g., 4l4md4r.exe), or __VIEWSTATE payload abuse. Unit 42Recorded FutureCentripetal
Segment & IsolateImmediately remove internet exposure of vulnerable SharePoint servers. Employ ZTNA and isolate to limit lateral movement. Windows Central
Strengthen DefenseEnable AMSI signs in SharePoint, update anti-malware engines, leverage endpoint detection, and monitor anomalous POST behavior. Tom’s HardwareWindows CentralLogpoint

CyberDudeBivash Support Ecosystem

  • Tools & Apps: Deep triage via cyberdudebivash.com/apps
  • Live Intel Feed: Stay updated at cyberbivash.blogspot.com
  • Infrastructure Risk Insights: cryptobivash.code.blog
  • Incident Playbooks & Consulting: Full enterprise response frameworks — hunt, isolate, recover.

#CyberDudeBivash #ToolShell #SharePointRCE #RCE #WarlockRansomware #Storm2603 #PatchManagement #ThreatIntel #CyberDefense

Leave a comment

Design a site like this with WordPress.com
Get started