Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Designing Better UX For Left-Handed People

      July 25, 2025

      This week in AI dev tools: Gemini 2.5 Flash-Lite, GitLab Duo Agent Platform beta, and more (July 25, 2025)

      July 25, 2025

      Tenable updates Vulnerability Priority Rating scoring method to flag fewer vulnerabilities as critical

      July 24, 2025

      Google adds updated workspace templates in Firebase Studio that leverage new Agent mode

      July 24, 2025

      Trump’s AI plan says a lot about open source – but here’s what it leaves out

      July 25, 2025

      Google’s new Search mode puts classic results back on top – how to access it

      July 25, 2025

      These AR swim goggles I tested have all the relevant metrics (and no subscription)

      July 25, 2025

      Google’s new AI tool Opal turns prompts into apps, no coding required

      July 25, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Laravel Scoped Route Binding for Nested Resource Management

      July 25, 2025
      Recent

      Laravel Scoped Route Binding for Nested Resource Management

      July 25, 2025

      Add Reactions Functionality to Your App With Laravel Reactions

      July 25, 2025

      saasykit/laravel-open-graphy

      July 25, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Sam Altman won’t trust ChatGPT with his “medical fate” unless a doctor is involved — “Maybe I’m a dinosaur here”

      July 25, 2025
      Recent

      Sam Altman won’t trust ChatGPT with his “medical fate” unless a doctor is involved — “Maybe I’m a dinosaur here”

      July 25, 2025

      “It deleted our production database without permission”: Bill Gates called it — coding is too complex to replace software engineers with AI

      July 25, 2025

      Top 6 new features and changes coming to Windows 11 in August 2025 — from AI agents to redesigned BSOD screens

      July 25, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Chinese Hackers Now Exploiting SharePoint Zero-Days to Deploy Warlock Ransomware: MSFT

    Chinese Hackers Now Exploiting SharePoint Zero-Days to Deploy Warlock Ransomware: MSFT

    July 24, 2025

    Warlock ransomware, Chinese Hackers, Storm-2603, SharePoint Zero-Day

    Microsoft Threat Intelligence in an updated warning said that China-based hackers, which it tracks as Storm-2603, has quickly pivoted and now exploiting unpatched on-premise SharePoint systems to deploy Warlock ransomware variant.

    Researchers at Microsoft had initially observed this threat actor making attempts to steal MachineKeys leveraging the on-premises SharePoint vulnerabilities, CVE-2025-53770 and CVE-2025-53771. The threat actor used a malicious script “spinstall0.aspx,”  which first retrieved the MachineKey data and then sent the results through a GET request, thereby enabling the theft of the key material.

    In SharePoint Online, machine keys are used to secure and validate various features like view state, forms authentication and session state status. They ensure that data exchanged between the server and the client is trusted and hasn’t been tampered with. These keys are crucial for maintaining the integrity of web applications, especially in a web farm environment where multiple servers handle user requests. 

    Microsoft has earlier observed Storm-2603 deploying Warlock and Lockbit ransomware variants but the current objectives remain unclear.

    The Attack Cycle

    The pivot towards ransomware deployment first began on July 18, according to Microsoft. The hackers exploited internet-facing on-premises SharePoint server for initial access to the victim’s environment. They used the spinstall0.aspx payload for initial access. This initial access was used to execute the w3wp.exe process, which is responsible for handling web requests and executing web applications.

    The attackers then executed a series of commands to understand the victim’s environment: whoami, for user context and validating privilege levels; cmd.exe and batch scripts for broader execution phases; and services.exe to disable Microsoft Defender protections through direct registry modifications.

    For persistence, the attackers leveraged multiple mechanisms including the initial malicious web shell, scheduled tasks and manipulated the Internet Information Services (IIS) components to deliver suspicious .NET assemblies. These mechanism in tandem ensured persistence in victim’s environment without detection, even if initial vectors were remediated.

    In the next stage of execution, the attackers used Mimikatz, an open source tool, to extract plaintext credentials. They specifically targeted the Local Security Authority Subsystem Service (LSASS) memory, for this.

    The attacker further moved laterally using PsExec and the Impacket toolkit, whose commands were executed using Windows Management Instrumentation (WMI), the researchers noted.

    In the final stage, Storm-2603 modified the Group Policy Objects (GPO) to distribute Warlock ransomware in compromised environments.

    Microsoft warned that, “additional actors will continue to use these exploits to target unpatched on-premises SharePoint systems,” thus making its patching more urgent.

    Also read: Zero-Day Vulnerability Hits Microsoft SharePoint, Urgent Patch Issued

    There are nearly 424 internet-facing on-premises SharePoint servers that still remain unpatched, according to the internet scanning tool from Shadowserver Foundation. “We have shared SharePoint IPs confirmed vulnerable to CVE-2025-53770, CVE-2025-53771,” it said on X.

    Unsurprisingly, most of the vulnerable IPs are from the U.S. with some from Russia, Iran, Germany and India.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleSophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices
    Next Article European Healthcare Giant AMEOS Group Suffers Major Cyberattack

    Related Posts

    Development

    Laravel Scoped Route Binding for Nested Resource Management

    July 25, 2025
    Development

    Add Reactions Functionality to Your App With Laravel Reactions

    July 25, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    MIT Researchers Introduce DISCIPL: A Self-Steering Framework Using Planner and Follower Language Models for Efficient Constrained Generation and Reasoning

    Machine Learning

    CVE-2025-48341 – 10Web Form Maker Stored Cross-site Scripting

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-3928 – Commvault Web Server Remote Webshell Execution

    Common Vulnerabilities and Exposures (CVEs)

    CSS FILTERS Explained

    Web Development

    Highlights

    ChatGPT can now sum up your meetings – here’s how to use it (and who can)

    June 21, 2025

    The feature can record meetings and voice notes, then convert them into text summaries, emails,…

    Task-Adaptive Pretrained Language Models via Clustered-Importance Sampling

    April 11, 2025

    CVE-2025-6342 – Code-projects Online Shoe Store SQL Injection Vulnerability

    June 20, 2025

    Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks

    May 6, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.