What to know about ToolShell, the SharePoint threat under mass exploitation

Date:

Share:


Microsoft fixed the vulnerability pair—CVE-2025-49706 and CVE-2025-49704—two weeks ago as part of the company’s monthly update release. As the world learned over the weekend, the patches were incomplete, a lapse that opened organizations around the world to the new attacks.

Q: What sorts of malicious things are attackers doing with these newer ToolShell exploits?

A: According to numerous technical analyses, the attackers first infect vulnerable systems with a webshell-based backdoor that gains access to some of the most sensitive parts of a SharePoint Server. From there, the webshell extracts tokens and other credentials that allow the attackers to gain administrative privileges, even when systems are protected by multifactor authentication and single sign-on. Once inside, the attackers exfiltrate sensitive data and deploy additional backdoors that provide persistent access for future use.

For those who want more technical details, the opening volley in the attack is POST Web requests the attackers send to the ToolPane endpoint. The requests look like this:

Microsoft said these requests upload a malicious script named spinstall0.aspx, or alternatively spinstall.aspx, spinstall1.aspx, spinstall2.aspx, and so on. The script contains commands for retrieving a SharePoint server’s encrypted MachineKey configuration and returning the decrypted results to the attacker through a GET request.

Q: I maintain an on-premises SharePoint server. What should I do?

A: In short, drop whatever else you were doing and take time to carefully inspect your system. The first thing to look for is whether it has received the emergency patches Microsoft released Saturday. Install the patch immediately if it hasn’t already been done.

Patching the vulnerability is only the first step, since systems infected through the vulnerability show few or no signs of compromise. The next step is to pore through system event logs in search of indicators of compromise. These indicators can be found in numerous write-ups, including those from Microsoft and Eye Security (at the links above), the US Cybersecurity and Information Security Agency, and security firms Sentinel One, Akamai, Tenable, and Palo Alto Networks.



Source link

━ more like this

Rubio raises alarm over Iran’s missile development capabilities targeting the US – London Business News | Londonlovesbusiness.com

In a stark warning, Senator Marco Rubio has alerted the public to the growing threat posed by Iran, stating that the nation is...

Moscow issues an ironic statement on the US and Israel’s attacks on Iran – London Business News | Londonlovesbusiness.com

Vladimir Putin’s foreign ministry has issued an ironic condemnation of the recent US-Israeli military strikes on Iran, signalling Russia’s disapproval and potential diplomatic...

Steam Next Fest, a different flavor of The Witcher and other new indie games worth checking out

Welcome to our latest roundup of what's going on in the indie game space. It's Steam Next Fest week, with literally thousands of...

Starmer chairs emergency Cobra meeting as US launches ‘major combat operations’ on Iran – London Business News | Londonlovesbusiness.com

Keir Starmer has chaired an emergency Cobra committee meeting, underscoring the UK’s commitment to addressing the escalating crisis involving the United States, Israel,...

GTA 6 may feature unprecedented real-world realism, claims alleged ex-Rockstar Employee

The hype around Grand Theft Auto 6 continues to build, and an alleged former Rockstar Games employee has added to the high expectations...
spot_img