Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Value-Driven AI Roadmap

      September 9, 2025

      This week in AI updates: Mistral’s new Le Chat features, ChatGPT updates, and more (September 5, 2025)

      September 6, 2025

      Designing For TV: Principles, Patterns And Practical Guidance (Part 2)

      September 5, 2025

      Neo4j introduces new graph architecture that allows operational and analytics workloads to be run together

      September 5, 2025

      Lenovo Legion Go 2 specs unveiled: The handheld gaming device to watch this October

      September 10, 2025

      As Windows 10 support ends, users weigh costly extended security program against upgrading to Windows 11

      September 10, 2025

      Lenovo’s Legion Glasses 2 update could change handheld gaming

      September 10, 2025

      Is Lenovo’s refreshed LOQ tower enough to compete? New OLED monitors raise the stakes at IFA 2025

      September 10, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      External Forces Reshaping Financial Services in 2025 and Beyond

      September 10, 2025
      Recent

      External Forces Reshaping Financial Services in 2025 and Beyond

      September 10, 2025

      Why It’s Time to Move from SharePoint On-Premises to SharePoint Online

      September 10, 2025

      Apple’s Big Move: The Future of Mobile

      September 10, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Lenovo Legion Go 2 specs unveiled: The handheld gaming device to watch this October

      September 10, 2025
      Recent

      Lenovo Legion Go 2 specs unveiled: The handheld gaming device to watch this October

      September 10, 2025

      As Windows 10 support ends, users weigh costly extended security program against upgrading to Windows 11

      September 10, 2025

      Lenovo’s Legion Glasses 2 update could change handheld gaming

      September 10, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Chinese Hackers Now Exploiting SharePoint Zero-Days to Deploy Warlock Ransomware: MSFT

    Chinese Hackers Now Exploiting SharePoint Zero-Days to Deploy Warlock Ransomware: MSFT

    July 24, 2025

    Warlock ransomware, Chinese Hackers, Storm-2603, SharePoint Zero-Day

    Microsoft Threat Intelligence in an updated warning said that China-based hackers, which it tracks as Storm-2603, has quickly pivoted and now exploiting unpatched on-premise SharePoint systems to deploy Warlock ransomware variant.

    Researchers at Microsoft had initially observed this threat actor making attempts to steal MachineKeys leveraging the on-premises SharePoint vulnerabilities, CVE-2025-53770 and CVE-2025-53771. The threat actor used a malicious script “spinstall0.aspx,”  which first retrieved the MachineKey data and then sent the results through a GET request, thereby enabling the theft of the key material.

    In SharePoint Online, machine keys are used to secure and validate various features like view state, forms authentication and session state status. They ensure that data exchanged between the server and the client is trusted and hasn’t been tampered with. These keys are crucial for maintaining the integrity of web applications, especially in a web farm environment where multiple servers handle user requests. 

    Microsoft has earlier observed Storm-2603 deploying Warlock and Lockbit ransomware variants but the current objectives remain unclear.

    The Attack Cycle

    The pivot towards ransomware deployment first began on July 18, according to Microsoft. The hackers exploited internet-facing on-premises SharePoint server for initial access to the victim’s environment. They used the spinstall0.aspx payload for initial access. This initial access was used to execute the w3wp.exe process, which is responsible for handling web requests and executing web applications.

    The attackers then executed a series of commands to understand the victim’s environment: whoami, for user context and validating privilege levels; cmd.exe and batch scripts for broader execution phases; and services.exe to disable Microsoft Defender protections through direct registry modifications.

    For persistence, the attackers leveraged multiple mechanisms including the initial malicious web shell, scheduled tasks and manipulated the Internet Information Services (IIS) components to deliver suspicious .NET assemblies. These mechanism in tandem ensured persistence in victim’s environment without detection, even if initial vectors were remediated.

    In the next stage of execution, the attackers used Mimikatz, an open source tool, to extract plaintext credentials. They specifically targeted the Local Security Authority Subsystem Service (LSASS) memory, for this.

    The attacker further moved laterally using PsExec and the Impacket toolkit, whose commands were executed using Windows Management Instrumentation (WMI), the researchers noted.

    In the final stage, Storm-2603 modified the Group Policy Objects (GPO) to distribute Warlock ransomware in compromised environments.

    Microsoft warned that, “additional actors will continue to use these exploits to target unpatched on-premises SharePoint systems,” thus making its patching more urgent.

    Also read: Zero-Day Vulnerability Hits Microsoft SharePoint, Urgent Patch Issued

    There are nearly 424 internet-facing on-premises SharePoint servers that still remain unpatched, according to the internet scanning tool from Shadowserver Foundation. “We have shared SharePoint IPs confirmed vulnerable to CVE-2025-53770, CVE-2025-53771,” it said on X.

    Unsurprisingly, most of the vulnerable IPs are from the U.S. with some from Russia, Iran, Germany and India.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleSophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices
    Next Article European Healthcare Giant AMEOS Group Suffers Major Cyberattack

    Related Posts

    Development

    How AI is Redefining Traditional GCC Cost Models for Peak Efficiency

    September 10, 2025
    Development

    How to Automate API Documentation Updates with GitHub Actions and OpenAPI Specifications

    September 10, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-53611 – Cisco Webex Meeting Server Authentication Bypass

    Common Vulnerabilities and Exposures (CVEs)

    Event-Driven Microservice Backend For a Modern E-commerce Platform.

    Development

    Intel could be prepping a new mid-range GPU, giving gamers another reason to skip NVIDIA’s RTX 5060

    News & Updates

    How to Add Product Badges in Optimizely Configured Commerce Spire

    Development

    Highlights

    22 Comic Book Illustrations to Give Your Designs Superpowers (2025)

    August 13, 2025

    Comic books aren’t just for collectors and cosplay. They’re a valuable design resource. With bold…

    STALKER 2’s roadmap for the rest of 2025 is revealed — and you won’t believe what’s coming to the zone

    August 18, 2025

    Over 1,200 Citrix servers unpatched against critical auth bypass flaw

    June 30, 2025

    Microsoft Edge 135 is here with big new features, and even bigger changes

    April 7, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.