Site icon WinCert

New wave of ransomware targets SharePoint Servers worldwide

<p>A fresh wave of cyberattacks has emerged&comma; with Microsoft sounding the alarm over a new threat aimed at SharePoint servers&period; A sophisticated Chinese threat group&comma; identified as Storm-2603&comma; is actively exploiting recently patched vulnerabilities in SharePoint systems&comma; triggering a global surge in ransomware incidents&period;<&sol;p>&NewLine;<p><img class&equals;"alignnone size-full wp-image-3387" src&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2019&sol;11&sol;hacker&lowbar;pixabay&period;jpg" alt&equals;"" width&equals;"640" height&equals;"426" &sol;><&sol;p>&NewLine;<p>The attacks are part of a broader campaign that has compromised hundreds of systems&period; Microsoft has discovered more than 420 SharePoint servers exposed to the internet&comma; many of which remain unprotected despite the release of patches for a critical exploit chain known as ToolShell&period; According to Shadowserver&comma; the majority of these systems are still vulnerable&period;<&sol;p>&NewLine;<p>Once attackers gain access&comma; they waste no time&period; Using powerful post-exploitation tools like Mimikatz&comma; they extract user credentials directly from memory&period; The attackers then spread laterally through the network using tools like PsExec and Impacket&comma; often modifying Group Policy settings to maintain control&period; Ransomware such as Warlock and Lockbit is deployed swiftly&comma; often within a few steps of initial entry&period;<&sol;p>&NewLine;<p>Security firm Eye Security reports that at least 400 servers have already been infected&comma; with 148 organizations confirmed as victims&period; These include high-profile targets such as federal agencies&comma; the U&period;S&period; National Nuclear Security Administration&comma; the Department of Education&comma; and state and national bodies across Europe and the Middle East&period;<&sol;p>&NewLine;<p>The U&period;S&period; Cybersecurity and Infrastructure Security Agency &lpar;CISA&rpar; has urgently flagged a key vulnerability tied to the campaign &lpar;CVE-2025-53770&rpar; and instructed all federal agencies to patch affected systems within 24 hours&period; Security researchers warn that some systems may have been quietly compromised for weeks&period; Although Microsoft hasn’t provided figures on data theft&comma; the speed and scale of the operation suggest attackers acted quickly once the vulnerabilities became known&period;<&sol;p>&NewLine;<p>The attack chain is straightforward but highly effective&colon; scan the internet for unpatched SharePoint servers&comma; exploit known flaws&comma; steal credentials&comma; install backdoor tools&comma; and deploy ransomware via scripted commands&period; Microsoft has advised all organizations using on-premises SharePoint to apply the latest security updates immediately and follow enhanced hardening steps available on its security blog&period;<&sol;p>&NewLine;

Exit mobile version