You have 0 free articles left this month.
Register for a free account to access unlimited free content.
Powered by MOMENTUM MEDIA
lawyers weekly logo

Powered by MOMENTUMMEDIA

For breaking news and daily updates, subscribe to our newsletter.
Advertisement

Around 100 organisations affected in Microsoft SharePoint data incident

Roughly 100 organisations have been affected by a major espionage campaign targeting Microsoft-owned SharePoint server software.

Around 100 organisations affected in Microsoft SharePoint data incident
expand image

Yesterday (21 July), the Australian Signals Directorate’s (ASD) Australian Cyber Security Centre (ACSC) released an “act now” critical alert regarding a vulnerability in Microsoft Office SharePoint Server products.

The bug – officially CVE-2025-53770, but also known publicly as ToolShell – is a variant of the previously disclosed vulnerability CVE-2025-49706.

Exploitation of this vulnerability enables the “deserialisation of untrusted data in on-premises Microsoft SharePoint Servers”, which, in turn, could lead to remote code execution and full access to SharePoint content.

 
 

The CEO of cyber security firm watchTowr, Benjamin Harris, said that exploitation of the bug was being tracked and that no patch was currently available.

“All signs point to widespread, mass exploitation – with compromised government, technology, and enterprise systems observed globally,” he said.

Now, Eye Security chief hacker Vaisha Bernard said that a scan conducted by the firm and the Shadowserver Foundation found almost 100 cases of exploitation.

“It’s unambiguous,” Bernard said. “Who knows what other adversaries have done since to place other backdoors.”

While the wave has not been attributed, Rafe Pilling, director of threat intelligence at British cyber security firm Sophos, said the activity appears to have been conducted by a single threat actor.

“Based on the consistency of the tradecraft seen across observed attacks, the campaign launched on Friday appears to be from a single actor,” he said.

“However, it’s possible that this will quickly change as awareness of the exploit chain spreads.

“In the initial campaign, we observed code being deployed that attempts to extract sensitive ASP.NET cryptographic secrets from the targeted servers.

“The threat actor can use these stolen secrets to enable additional access to the victim. Organisations using this software should urgently follow Microsoft’s patching and remediation advice.”

While a lack of patch makes dealing with the attacks difficult, KnowBe4 security awareness advocate James McQuiggan said there are steps CISOs can take to protect their businesses.

“While the vulnerability impacts only SharePoint systems hosted on-prem, the risk is significantly higher if the SharePoint instance is exposed to the internet. That said, even if it’s only accessible within the network, there’s still a risk. The impact might be slower, but if attackers are already inside the network, they can target SharePoint to access sensitive data and gain a deeper foothold,” he told Cyber Daily.

“Organisations should evaluate the business impact of downtime versus the risk of compromise. Access should be limited to essential users only and restricted through VPN. Security operations teams need to increase monitoring of SharePoint activity for any signs of suspicious behaviour. It’s also important to engage cyber security vendors to determine whether they’ve identified any indicators of compromise related to this specific type of attack.

“And in a worst-case scenario, isolating the SharePoint server from the internet or even temporarily taking it offline may be the safest move to protect the organisation.”

Daniel Croft

Daniel Croft

Born in the heart of Western Sydney, Daniel Croft is a passionate journalist with an understanding for and experience writing in the technology space. Having studied at Macquarie University, he joined Momentum Media in 2022, writing across a number of publications including Australian Aviation, Cyber Security Connect and Defence Connect. Outside of writing, Daniel has a keen interest in music, and spends his time playing in bands around Sydney.
You need to be a member to post comments. Become a member for free today!

newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.