China's Salt Typhoon exploited SharePoint to hit govts
Briefly

China's Salt Typhoon exploited SharePoint to hit govts
"It now appears other Beijing crews - including Salt Typhoon, which famously hacked America's major telecommunications firms and stole information belonging to nearly every American - also joined in the attacks. On Wednesday, the Symantec and Carbon Black threat hunters said China-based attackers using malware linked to Salt Typhoon abused ToolShell to break into a Middle East telecom company and two African government departments shortly after the vulnerability was patched."
"In July, Microsoft patched the so-called ToolShell vulnerability ( CVE-2025-53770), a critical remote code execution bug in on-premises SharePoint servers. But before Redmond fixed the flaw, Chinese attackers found and exploited it as a zero-day, compromising more than 400 organizations, including the US Energy Department. At the time, Microsoft attributed the break-ins to three China-based groups. These included two government-backed groups: Linen Typhoon (aka Emissary Panda, APT27), which typically steals intellectual property."
Multiple China-based threat groups exploited the ToolShell vulnerability (CVE-2025-53770) in on-premises Microsoft SharePoint servers as a zero-day, compromising over 400 organizations including the US Energy Department. Microsoft linked initial intrusions to three China-based groups: government-backed Linen Typhoon (Emissary Panda, APT27) and Violet Typhoon (Zirconium, APT31), plus suspected criminal Storm-2603 using Warlock ransomware. Additional Beijing crews, including Salt Typhoon, also abused the flaw to target a Middle East telecom, two African government departments, government agencies, a university, and a finance company. Symantec and Carbon Black uncovered more victims and malware tools, including use of the Zingdoor HTTP backdoor written in Go.
Read at Theregister
Unable to calculate read time
[
|
]