China-linked hackers exploit SharePoint zero-day for rapid ransomware attacks

Kavitha Nair
By
Kavitha Nair
AI-powered tech writer covering the business and industry of technology.
8 Min Read
China-linked hackers exploit SharePoint zero-day for rapid ransomware attacks — AI-generated illustration

The SharePoint zero-day vulnerability tracked as CVE-2025-53770, dubbed ToolShell, represents a watershed moment in how fast attackers can weaponize critical flaws. Microsoft’s warning that China-based threat actors exploited this flaw just two days after an emergency patch on July 20, 2025, exposes a collapsing window between patch release and active exploitation that should alarm every organization running on-premise SharePoint servers.

Key Takeaways

  • ToolShell (CVE-2025-53770) allows unauthenticated remote code execution on unpatched SharePoint servers, exposing all content and file systems
  • Attacks began July 7, 2025, in the wild; exploitation accelerated within 2 days of Microsoft’s July 20 patch release
  • Four China-nexus threat groups identified: Storm-2603, Budworm, Sheathminer, and Glowworm, with Storm-2603 linked to Warlock ransomware deployment
  • Victims span government networks in Africa and South America, plus a major Middle Eastern telecom firm, indicating mass scanning for high-value targets
  • Post-exploitation tool Zingdoor enables persistent backdoor access for system reconnaissance and arbitrary command execution

How the SharePoint Zero-Day Vulnerability Works

ToolShell is a critical remote code execution flaw in on-premise Microsoft SharePoint servers that requires no authentication to trigger. Once exploited, attackers gain complete access to all SharePoint content, file systems, and sensitive private keys—credentials that unlock further lateral movement into organizational networks. The vulnerability’s severity lies not just in what it exposes, but in how quickly it can be chained with other tools to establish persistent presence.

The exploitation timeline is what makes this incident alarming. Proof-of-concept code entered public circulation after Microsoft’s patch, but evidence suggests the flaw was known and weaponized weeks before disclosure. A Middle Eastern telecom was hit on July 21, 2025—just one day after the patch dropped—indicating either pre-patch knowledge or rapid reverse-engineering from the patch itself. This compressed timeline reflects a troubling reality: defenders now have hours, not days, to patch before attackers strike.

The Threat Actors Behind the Attacks

Microsoft and Google’s Mandiant division have attributed the exploitation campaign to multiple China-nexus groups. Storm-2603 stands out as the primary actor, using the SharePoint zero-day to deploy Warlock ransomware—marking the first confirmed link between this group and ransomware operations via this particular vulnerability. Three other Chinese APTs are also confirmed exploiting the flaw: Budworm (tracked as Linen Typhoon), Sheathminer (Violet Typhoon), and Glowworm (Earth Estries/FamousSparrow).

The geographic spread of targets suggests these groups are conducting mass scanning rather than precision targeting. Victims include government networks in Africa and South America, alongside a major telecom operator in the Middle East. This pattern indicates dual-purpose exploitation: ransomware deployment for immediate revenue, combined with persistent access establishment for espionage and intellectual property theft. Post-exploitation, attackers deployed Zingdoor, a persistent HTTP backdoor that collects system information, manages files, and executes arbitrary commands—the hallmark of a group planning long-term presence.

How This Compares to Previous Microsoft Zero-Day Campaigns

The SharePoint zero-day mirrors tactics used by Chinese group Hafnium in 2021, when it exploited multiple Microsoft Exchange zero-days against US government agencies, infectious disease researchers, and defense contractors. Like that campaign, ToolShell exploitation targets high-value organizations with espionage potential. The critical difference is speed. Hafnium’s Exchange campaign unfolded over weeks; this SharePoint attack compressed exploitation into days.

The acceleration reflects both improved attacker capabilities and Microsoft’s shift to faster patch cycles. When patches drop more frequently, reverse-engineering becomes a viable attack vector—attackers simply compare patched code against unpatched versions to identify flaws. This creates a perverse incentive: organizations that delay patching face exponentially higher risk, but organizations that patch immediately still face the threat of rapid exploitation by sophisticated actors.

What Organizations Need to Do Right Now

For any organization running on-premise SharePoint servers, patching is now a critical incident response priority, not a routine maintenance task. The two-day exploitation window after patch release means that unpatched systems are actively being scanned and compromised. Organizations should treat this as a potential breach scenario: assume that any unpatched SharePoint server exposed to the internet may already be compromised.

Beyond patching, the Zingdoor backdoor discovery suggests that compromised systems may harbor persistent access tools that patching alone will not remove. Organizations that identify successful exploitation attempts should conduct forensic investigation to determine whether backdoors were installed, sensitive data was exfiltrated, or lateral movement occurred. This requires more than a patch—it requires incident response, network segmentation review, and credential rotation for accounts with access to sensitive systems.

Why the Patching Window Is Shrinking

The collapse of the patching window reflects a fundamental shift in the threat landscape. When proof-of-concept exploits become public, the attacker advantage window closes rapidly. In this case, Microsoft’s emergency patch inadvertently provided a roadmap for exploitation: any actor with reverse-engineering skills could compare the patched code to unpatched versions and identify the vulnerability. This is not a new problem, but the speed of exploitation in this incident—2 days—suggests attackers either had pre-patch knowledge or possess unusually sophisticated reverse-engineering capabilities.

Microsoft’s warning that patching windows are shrinking while exploitation windows are expanding captures a grim reality: the traditional patch-and-wait model is obsolete. Organizations can no longer rely on a grace period between patch release and active exploitation. For critical vulnerabilities, the grace period is measured in hours, not weeks.

Is the SharePoint zero-day vulnerability actively being exploited right now?

Yes. Attacks began in the wild as early as July 7, 2025, and accelerated after Microsoft’s July 20 patch, with confirmed exploitation against a Middle Eastern telecom on July 21. Any on-premise SharePoint server not patched is actively at risk of compromise.

What is Zingdoor and why does it matter?

Zingdoor is a persistent HTTP backdoor deployed by attackers after exploiting the SharePoint zero-day. It enables system reconnaissance, file management, and arbitrary command execution, allowing attackers to maintain long-term access even after the initial vulnerability is patched. Its presence indicates the attack went beyond ransomware deployment to establish espionage infrastructure.

How does this zero-day compare to the 2021 Hafnium Exchange attacks?

Both campaigns targeted high-value organizations and were attributed to China-nexus groups, but the SharePoint exploitation compressed the attack timeline from weeks to days. This acceleration reflects improved attacker capabilities and the vulnerability of patch-based defense models against sophisticated adversaries.

The SharePoint zero-day incident underscores a hard truth: patching is necessary but no longer sufficient. Organizations that treat security as a checkbox exercise—patch when convenient, assume you are safe—will be compromised. The actors behind this campaign have demonstrated the ability to weaponize critical flaws within hours of patch release. For security teams, that means moving from reactive patching to proactive threat hunting, network monitoring, and the assumption that sophisticated adversaries may already be inside. Speed kills in cybersecurity, and right now, the attackers are faster.

This article was written with AI assistance and editorially reviewed.

Source: TechRadar

Share This Article
AI-powered tech writer covering the business and industry of technology.