What to know about ToolShell, the SharePoint threat under mass exploitation

Date:

Share:


Microsoft fixed the vulnerability pair—CVE-2025-49706 and CVE-2025-49704—two weeks ago as part of the company’s monthly update release. As the world learned over the weekend, the patches were incomplete, a lapse that opened organizations around the world to the new attacks.

Q: What sorts of malicious things are attackers doing with these newer ToolShell exploits?

A: According to numerous technical analyses, the attackers first infect vulnerable systems with a webshell-based backdoor that gains access to some of the most sensitive parts of a SharePoint Server. From there, the webshell extracts tokens and other credentials that allow the attackers to gain administrative privileges, even when systems are protected by multifactor authentication and single sign-on. Once inside, the attackers exfiltrate sensitive data and deploy additional backdoors that provide persistent access for future use.

For those who want more technical details, the opening volley in the attack is POST Web requests the attackers send to the ToolPane endpoint. The requests look like this:

Microsoft said these requests upload a malicious script named spinstall0.aspx, or alternatively spinstall.aspx, spinstall1.aspx, spinstall2.aspx, and so on. The script contains commands for retrieving a SharePoint server’s encrypted MachineKey configuration and returning the decrypted results to the attacker through a GET request.

Q: I maintain an on-premises SharePoint server. What should I do?

A: In short, drop whatever else you were doing and take time to carefully inspect your system. The first thing to look for is whether it has received the emergency patches Microsoft released Saturday. Install the patch immediately if it hasn’t already been done.

Patching the vulnerability is only the first step, since systems infected through the vulnerability show few or no signs of compromise. The next step is to pore through system event logs in search of indicators of compromise. These indicators can be found in numerous write-ups, including those from Microsoft and Eye Security (at the links above), the US Cybersecurity and Information Security Agency, and security firms Sentinel One, Akamai, Tenable, and Palo Alto Networks.



Source link

━ more like this

Step aboard NASA’s imminent moon mission and follow the crew day by day

NASA recently announced that it’s targeting April 1 for the launch of its highly anticipated lunar-bound mission, Artemis II. Inside the Orion spacecraft lifted...

Playdate games to check out before the Catalog’s 3-year anniversary sale ends

If your Playdate wishlist is anything like mine (endless), here's a good excuse to actually go ahead and free some of those games...

Adobe to offer users free services $75 million over hard-to-cancel subscription mess

Adobe has agreed to a $150 million settlement to resolve a U.S. government lawsuit that accused the company of making its subscriptions unnecessarily...

Samsung’s wireless power bank tries to fill the magnetic charging gap on the Galaxy S26

Samsung has launched its first magnetic wireless power bank. Dubbed the Magnet Wireless Battery Pack, the device is specifically designed to address the...

The hot AI video generator that got everyone talking may now take a while to arrive

One of the most talked-about AI video generators in recent weeks may not arrive as quickly as expected. According to a new report...
spot_img