Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Designing Better UX For Left-Handed People

      July 25, 2025

      This week in AI dev tools: Gemini 2.5 Flash-Lite, GitLab Duo Agent Platform beta, and more (July 25, 2025)

      July 25, 2025

      Tenable updates Vulnerability Priority Rating scoring method to flag fewer vulnerabilities as critical

      July 24, 2025

      Google adds updated workspace templates in Firebase Studio that leverage new Agent mode

      July 24, 2025

      I ran with the Apple Watch and Samsung Watch 8 – here’s the better AI coach

      July 26, 2025

      8 smart home gadgets that instantly upgraded my house (and why they work)

      July 26, 2025

      I tested Panasonic’s new affordable LED TV model – here’s my brutally honest buying advice

      July 26, 2025

      OpenAI teases imminent GPT-5 launch. Here’s what to expect

      July 26, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      NativePHP Is Entering Its Next Phase

      July 26, 2025
      Recent

      NativePHP Is Entering Its Next Phase

      July 26, 2025

      Medical Card Generator Android App Project Using SQLite

      July 26, 2025

      The details of TC39’s last meeting

      July 26, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Elden Ring Nightreign’s Patch 1.02 update next week is adding a feature we’ve all been waiting for since launch — and another I’ve been begging for, too

      July 26, 2025
      Recent

      Elden Ring Nightreign’s Patch 1.02 update next week is adding a feature we’ve all been waiting for since launch — and another I’ve been begging for, too

      July 26, 2025

      The next time you look at Microsoft Copilot, it may look back — but who asked for this?

      July 26, 2025

      5 Open Source Apps You Can use for Seamless File Transfer Between Linux and Android

      July 26, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Chinese Hackers Now Exploiting SharePoint Zero-Days to Deploy Warlock Ransomware: MSFT

    Chinese Hackers Now Exploiting SharePoint Zero-Days to Deploy Warlock Ransomware: MSFT

    July 24, 2025

    Warlock ransomware, Chinese Hackers, Storm-2603, SharePoint Zero-Day

    Microsoft Threat Intelligence in an updated warning said that China-based hackers, which it tracks as Storm-2603, has quickly pivoted and now exploiting unpatched on-premise SharePoint systems to deploy Warlock ransomware variant.

    Researchers at Microsoft had initially observed this threat actor making attempts to steal MachineKeys leveraging the on-premises SharePoint vulnerabilities, CVE-2025-53770 and CVE-2025-53771. The threat actor used a malicious script “spinstall0.aspx,”  which first retrieved the MachineKey data and then sent the results through a GET request, thereby enabling the theft of the key material.

    In SharePoint Online, machine keys are used to secure and validate various features like view state, forms authentication and session state status. They ensure that data exchanged between the server and the client is trusted and hasn’t been tampered with. These keys are crucial for maintaining the integrity of web applications, especially in a web farm environment where multiple servers handle user requests. 

    Microsoft has earlier observed Storm-2603 deploying Warlock and Lockbit ransomware variants but the current objectives remain unclear.

    The Attack Cycle

    The pivot towards ransomware deployment first began on July 18, according to Microsoft. The hackers exploited internet-facing on-premises SharePoint server for initial access to the victim’s environment. They used the spinstall0.aspx payload for initial access. This initial access was used to execute the w3wp.exe process, which is responsible for handling web requests and executing web applications.

    The attackers then executed a series of commands to understand the victim’s environment: whoami, for user context and validating privilege levels; cmd.exe and batch scripts for broader execution phases; and services.exe to disable Microsoft Defender protections through direct registry modifications.

    For persistence, the attackers leveraged multiple mechanisms including the initial malicious web shell, scheduled tasks and manipulated the Internet Information Services (IIS) components to deliver suspicious .NET assemblies. These mechanism in tandem ensured persistence in victim’s environment without detection, even if initial vectors were remediated.

    In the next stage of execution, the attackers used Mimikatz, an open source tool, to extract plaintext credentials. They specifically targeted the Local Security Authority Subsystem Service (LSASS) memory, for this.

    The attacker further moved laterally using PsExec and the Impacket toolkit, whose commands were executed using Windows Management Instrumentation (WMI), the researchers noted.

    In the final stage, Storm-2603 modified the Group Policy Objects (GPO) to distribute Warlock ransomware in compromised environments.

    Microsoft warned that, “additional actors will continue to use these exploits to target unpatched on-premises SharePoint systems,” thus making its patching more urgent.

    Also read: Zero-Day Vulnerability Hits Microsoft SharePoint, Urgent Patch Issued

    There are nearly 424 internet-facing on-premises SharePoint servers that still remain unpatched, according to the internet scanning tool from Shadowserver Foundation. “We have shared SharePoint IPs confirmed vulnerable to CVE-2025-53770, CVE-2025-53771,” it said on X.

    Unsurprisingly, most of the vulnerable IPs are from the U.S. with some from Russia, Iran, Germany and India.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleSophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices
    Next Article European Healthcare Giant AMEOS Group Suffers Major Cyberattack

    Related Posts

    Development

    NativePHP Is Entering Its Next Phase

    July 26, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    July 26, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Rilasciata /e/OS 3.0: Nuova Vita per Android Senza Google, Più Privacy e Controllo per l’Utente

    Linux

    Pinta 3.0 Released With New Effects and GTK4 Port

    Linux

    Outside Processing vs Contract Manufacturing

    Development

    CVE-2025-49009 – Facebook Para Facebook Auth Token Information Disclosure

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-31191: Microsoft Exposes macOS Vulnerability Allowing App Sandbox Escape

    May 4, 2025

    CVE-2025-31191: Microsoft Exposes macOS Vulnerability Allowing App Sandbox Escape

    Microsoft Threat Intelligence has disclosed a significant vulnerability in macOS that could allow attackers to bypass the App Sandbox and execute unauthorized code on affected systems. The vulnerabili …
    Read more

    Published Date:
    May 05, 2025 (1 hour, 42 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2025-31191

    CVE-2024-54527

    I’m reinstalling Starfield to play this crazy new Watchtower ‘Creations’ mod from some of Fallout’s best modders — the latest update just added an amazing feature, too

    May 22, 2025

    Rilasciato Thunderbird 140 ESR: Un’attenzione alle esigenze aziendali

    July 3, 2025

    Cisco fixes two critical make-me-root bugs on Identity Services Engine components

    June 26, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.