Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Campaigns
  3. SharePoint ToolShell Exploitation

SharePoint ToolShell Exploitation

TheSharePoint ToolShell Exploitation campaign was conducted in July 2025 and encompassed the first waves of exploitation against incompletely patched spoofing (CVE-2025-49706) and remote code execution (CVE-2025-49704) vulnerabilities affecting on-premises Microsoft SharePoint servers. Later patched and updated as CVE-2025-53770 and CVE-2025-53771, the ToolShell vulnerabilities were widely exploited including by China-based ransomware actor Storm-2603 and espionage actorsThreat Group-3390 andZIRCONIUM.SharePoint ToolShell Exploitation targeted multiple regions and industries including finance, education, energy, and healthcare across Asia, Europe, and the United States.[1][2][3][4][5]

ID: C0058
First Seen: July 2025[1]
Last Seen: July 2025[2]
Contributors: Wai Linn Oo @ Kernellix
Version: 1.0
Created: 15 October 2025
Last Modified: 12 November 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1583.001Acquire Infrastructure:Domains

DuringSharePoint ToolShell Exploitation, threat actors registered C2 domains to spoof legitimate Microsoft domains.[1][2]

EnterpriseT1595.002Active Scanning:Vulnerability Scanning

DuringSharePoint ToolShell Exploitation, threat actors scanned for SharePoint servers vulnerable to CVE-2025-53770.[2]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

DuringSharePoint ToolShell Exploitation, threat actors issued HTTPPOST requests to web shells with spoofed or empty Referrer headers, to circumvent authorization controls.[1][3][5][6][2]

EnterpriseT1119Automated Collection

DuringSharePoint ToolShell Exploitation, threat actors used a command shell to automatically iterate through web.config files to expose and collect machineKey settings.[5][2]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

DuringSharePoint ToolShell Exploitation, threat actors used PowerShell to execute attacker-controlled encoded commands.[1][3][6][2]

.003Command and Scripting Interpreter:Windows Command Shell

DuringSharePoint ToolShell Exploitation, threat actors utilizedcmd.exe and batch scripts within the victim environment.[1][4][3][6]

EnterpriseT1486Data Encrypted for Impact

DuringSharePoint ToolShell Exploitation, threat actors deployed ransomware including 4L4MD4R and Warlock.[1][2]

EnterpriseT1005Data from Local System

DuringSharePoint ToolShell Exploitation, threat actors extracted information from the compromised systems.[1][4][6][2]

EnterpriseT1074.001Data Staged:Local Data Staging

DuringSharePoint ToolShell Exploitation, threat actors staged stolen data from web.config files to debug_dev.js.[2][5]

EnterpriseT1140Deobfuscate/Decode Files or Information

DuringSharePoint ToolShell Exploitation, threat actors decrypted scripts prior to execution.[2]

EnterpriseT1484.001Domain or Tenant Policy Modification:Group Policy Modification

DuringSharePoint ToolShell Exploitation, threat actors, including Storm-2603, modified group policy to enable ransomware distribution.[1]

EnterpriseT1585.002Establish Accounts:Email Accounts

DuringSharePoint ToolShell Exploitation, threat actors created Proton mail accounts for communication with organizations infected with ransomware.[2]

EnterpriseT1041Exfiltration Over C2 Channel

DuringSharePoint ToolShell Exploitation, threat actors exfiltrated stolen credentials and internal data over HTTPS to C2 infrastructure.[1]

EnterpriseT1190Exploit Public-Facing Application

DuringSharePoint ToolShell Exploitation, threat actors exploited authentication bypass and remote code execution vulnerabilities (CVE-2025-49706 and CVE-2025-49704) against on-premises SharePoint servers. This activity was characterized by craftedPOST requests to the ToolPane endpoint/_layouts/15/ToolPane.aspx.[1][4][3][5][6][2]

EnterpriseT1083File and Directory Discovery

DuringSharePoint ToolShell Exploitation, threat actors leveraged commands to locate accessible file shares, backup paths, or SharePoint content.[1]

EnterpriseT1657Financial Theft

DuringSharePoint ToolShell Exploitation, threat actors demanded ransom payments to unencrypt filesystems and to refrain from publishing sensitive data exfiltrated from victim networks.[2]

EnterpriseT1562.001Impair Defenses:Disable or Modify Tools

DuringSharePoint ToolShell Exploitation, threat actors disabled Microsoft Defender through Registry settings and real-time monitoring via PowerShell.[1][2]

EnterpriseT1105Ingress Tool Transfer

DuringSharePoint ToolShell Exploitation, threat actors used a loader to download and execute ransomware.[2]

EnterpriseT1570Lateral Tool Transfer

DuringSharePoint ToolShell Exploitation, threat actors usedImpacket to remotely stage and execute payloads via WMI.[1]

EnterpriseT1112Modify Registry

DuringSharePoint ToolShell Exploitation, threat actors, including Storm-2603, disabled security services via Registry modifications.[1]

EnterpriseT1027.002Obfuscated Files or Information:Software Packing

DuringSharePoint ToolShell Exploitation, threat actors UPX-packed malicous payloads including 4L4MD4R ransomware.[2]

.010Obfuscated Files or Information:Command Obfuscation

DuringSharePoint ToolShell Exploitation, threat actors executed Base64-encoded PowerShell commands.[1][3][5][6][2]

EnterpriseT1588.002Obtain Capabilities:Tool

DuringSharePoint ToolShell Exploitation, threat actors leveraged tools includingImpacket,PsExec, andMimikatz.[1]

EnterpriseT1003.001OS Credential Dumping:LSASS Memory

DuringSharePoint ToolShell Exploitation, threat actors usedMimikatz to dump LSASS memory.[1]

EnterpriseT1572Protocol Tunneling

DuringSharePoint ToolShell Exploitation, threat actors utilizedngrok tunnels to deliver PowerShell payloads.[1]

EnterpriseT1090Proxy

DuringSharePoint ToolShell Exploitation, threat actors used Fast Reverse Proxy to communicate with C2.[1][4]

EnterpriseT1620Reflective Code Loading

DuringSharePoint ToolShell Exploitation, threat actors reflectively loaded payloads usingSystem.Reflection.Assembly.Load.[1][3][5][6][2]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

DuringSharePoint ToolShell Exploitation, threat actors used scheduled tasks to help establish persistence.[1]

EnterpriseT1505.003Server Software Component:Web Shell

DuringSharePoint ToolShell Exploitation, threat actors followed exploitation of SharePoint servers with installation of a malicious .aspx web shell (spinstall0.aspx) that was written to the_layouts/15/ directory, granting persistent HTTP-based access.[1][4][3][5][6][2]

.004Server Software Component:IIS Components

DuringSharePoint ToolShell Exploitation, threat actors modified Internet Information Services (IIS) components to load suspicious .NET assemblies for persistence.[1]

EnterpriseT1082System Information Discovery

DuringSharePoint ToolShell Exploitation, threat actors fingerprinted targeted SharePoint servers to identify OS version and running processes.[1]

EnterpriseT1033System Owner/User Discovery

DuringSharePoint ToolShell Exploitation, threat actors executedwhoami on victim machines to enumerate user context and validate privilege levels.[1][6]

EnterpriseT1569.002System Services:Service Execution

DuringSharePoint ToolShell Exploitation, threat actors leveragedPsExec for command execution and usedservices.exe to disable Microsoft Defender via Registry keys.[1]

EnterpriseT1552.001Unsecured Credentials:Credentials In Files

DuringSharePoint ToolShell Exploitation, threat actors accessed web.config and machine.config to extract MachineKey values, enabling them to forge legitimate VIEWSTATE tokens for future deserialization payloads.[1][3][5][6][2]

EnterpriseT1047Windows Management Instrumentation

DuringSharePoint ToolShell Exploitation, threat actors used WMI for execution.[1]

Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp