{"id":5010,"date":"2025-07-28T16:00:52","date_gmt":"2025-07-28T16:00:52","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=5010"},"modified":"2025-07-28T16:00:53","modified_gmt":"2025-07-28T16:00:53","slug":"an-all-you-can-eat-buffet-for-menace-actors","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=5010","title":{"rendered":"An all-you-can-eat buffet for menace actors"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"sub-title\">ESET Analysis has been monitoring assaults involving the just lately found ToolShell zero-day vulnerabilities<\/p>\n<div class=\"article-authors d-flex flex-wrap\">\n<div class=\"article-author d-flex\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/our-experts\/eset-research\/\" title=\"ESET Research\"><picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2022\/03\/twitter_profile_picture_400x400.png\" media=\"(max-width: 768px)\"\/><img decoding=\"async\" class=\"author-image me-3\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2022\/03\/twitter_profile_picture_400x400.png\" alt=\"ESET Research\"\/><\/picture><\/a><\/div>\n<\/div>\n<p class=\"article-info mb-5\">\n        <span>24 Jul 2025<\/span><br \/>\n        <span class=\"d-none d-lg-inline\">\u00a0\u2022\u00a0<\/span><br \/>\n        <span class=\"d-inline d-lg-none\">, <\/span><br \/>\n        <span>5 min. learn<\/span>\n    <\/p>\n<div class=\"hero-image-container\">\n        <picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x266\/wls\/2025\/07-25\/toolshell\/toolshell-vulnerability-exploitation-research-eset.jpeg\" media=\"(max-width: 768px)\"\/><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x425\/wls\/2025\/07-25\/toolshell\/toolshell-vulnerability-exploitation-research-eset.jpeg\" media=\"(max-width: 1120px)\"\/><img decoding=\"async\" class=\"hero-image\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x700\/wls\/2025\/07-25\/toolshell\/toolshell-vulnerability-exploitation-research-eset.jpeg\" alt=\"ToolShell: An all-you-can-eat buffet for threat actors\"\/><\/picture>    <\/div>\n<\/div>\n<div>\n<p>On July 19<sup>th<\/sup>, 2025, Microsoft <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/blog\/2025\/07\/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770\/\" target=\"_blank\" rel=\"noopener\">confirmed<\/a> {that a} set of zero-day vulnerabilities in SharePoint Server known as ToolShell is being exploited within the wild. ToolShell is comprised of <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53770\" target=\"_blank\" rel=\"noopener\">CVE-2025-53770<\/a>, a distant code execution vulnerability, and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53771\" target=\"_blank\" rel=\"noopener\">CVE\u20112025\u201153771<\/a>, a server spoofing vulnerability. These assaults goal on-premises Microsoft SharePoint servers, particularly these working SharePoint Subscription Version, SharePoint 2019, or SharePoint 2016. SharePoint On-line in Microsoft 365 is just not impacted. Exploiting these vulnerabilities allows menace actors to realize entry to restricted methods and steal delicate data.<\/p>\n<p>Ranging from July 17<sup>th<\/sup>, ToolShell has been extensively exploited by all kinds of menace actors, from petty cybercriminals to nation-state APT teams. Since SharePoint is built-in with different Microsoft providers, akin to Workplace, Groups, OneDrive, and Outlook, this compromise can present the attackers a staggering stage of entry throughout the affected community.<\/p>\n<p>As a part of the assault, the menace actors usually chain collectively 4 vulnerabilities: the beforehand patched <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-49704\" target=\"_blank\" rel=\"noopener\">CVE\u20112025\u201149704<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-49706\" target=\"_blank\" rel=\"noopener\">CVE-2025-49706<\/a>, alongside the already talked about CVE-2025-53770 and CVE-2025-53771. As of <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/07\/22\/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities\/\" target=\"_blank\" rel=\"noopener\">July 22<\/a>, CVE\u20112025\u201153770 and CVE-2025-53771 have additionally been patched.<\/p>\n<h2>Webshell payloads<\/h2>\n<p>Exploiting ToolShell permits the attackers to bypass multi-factor authentication (MFA), and single sign-on (SSO). After getting contained in the focused server, attackers had been seen deploying malicious webshells to extract data from the compromised system. One of many scripts ceaselessly used for this objective is known as <span style=\"font-family: 'Courier New', Courier, monospace;\">spinstall0.aspx<\/span>, which we monitor as MSIL\/Webshell.JS.<\/p>\n<p>Moreover, on July 22<sup>nd<\/sup>, 2025, we noticed that attackers tried to deploy different easy ASP webshells able to executing attacker-supplied instructions by way of <span style=\"font-family: 'Courier New', Courier, monospace;\">cmd.exe<\/span>. These webshells had been deployed utilizing the next filenames: <span style=\"font-family: 'Courier New', Courier, monospace;\">ghostfile346.aspx<\/span>, <span style=\"font-family: 'Courier New', Courier, monospace;\">ghostfile399.aspx<\/span>, <span style=\"font-family: 'Courier New', Courier, monospace;\">ghostfile807.aspx<\/span>, <span style=\"font-family: 'Courier New', Courier, monospace;\">ghostfile972.aspx<\/span>, and <span style=\"font-family: 'Courier New', Courier, monospace;\">ghostfile913.aspx<\/span>.<\/p>\n<p>ESET merchandise first detected an try to take advantage of a part of the execution chain \u2013 the Sharepoint\/Exploit.CVE-2025-49704 vulnerability \u2013 on July 17<sup>th<\/sup> in Germany. Nonetheless, as a result of this try was blocked, the ultimate webshell payload was not delivered to the focused system. The primary time we registered the payload itself was on July 18<sup>th<\/sup> on a server in Italy. As seen in Determine 1, we now have since noticed energetic ToolShell exploitation all around the world, with the US (13.3% of assaults) being probably the most focused nation in response to our telemetry knowledge.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 1. Geographic distribution of ToolShell attacks from July 17, 2025 to July 22, 2025\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/07-25\/toolshell\/figure-1.png\" alt=\"Figure 1. ToolShell map victims\" width=\"\" height=\"\"\/><figcaption><em>Determine 1. Geographic distribution of ToolShell assaults from July 17, 2025 to July 22, 2025<\/em><\/figcaption><\/figure>\n<h2>Assault monitoring<\/h2>\n<p>Our monitoring of the ToolShell assaults from July 17<sup>th<\/sup> to July 22<sup>nd<\/sup> revealed that they had been coming from the IP addresses proven in Desk 1 (all occasions are in UTC).<\/p>\n<p style=\"text-align: center;\"><em>Desk 1. Attacker IP addresses<\/em><\/p>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"207\"><strong>IP deal with<\/strong><\/td>\n<td width=\"207\"><strong>Assault begin date<\/strong><\/td>\n<td width=\"207\"><strong>Assault finish date<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">96.9.125[.]147<\/span><\/td>\n<td width=\"207\">2025-07-17 09:00<\/td>\n<td width=\"207\">2025-07-17 16:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">107.191.58[.]76<\/span><\/td>\n<td width=\"207\">2025-07-18 14:00<\/td>\n<td width=\"207\">2025-07-18 20:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">104.238.159[.]149<\/span><\/td>\n<td width=\"207\">2025-07-19 04:00<\/td>\n<td width=\"207\">2025-07-19 09:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">139.59.11[.]66<\/span><\/td>\n<td width=\"207\">2025-07-21 11:00<\/td>\n<td width=\"207\">2025-07-21 16:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">154.223.19[.]106<\/span><\/td>\n<td width=\"207\">2025-07-21 13:00<\/td>\n<td width=\"207\">2025-07-22 18:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">103.151.172[.]92<\/span><\/td>\n<td width=\"207\">2025-07-21 14:00<\/td>\n<td width=\"207\">2025-07-21 16:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">45.191.66[.]77<\/span><\/td>\n<td width=\"207\">2025-07-21 14:00<\/td>\n<td width=\"207\">2025-07-22 07:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">83.136.182[.]237<\/span><\/td>\n<td width=\"207\">2025-07-21 14:00<\/td>\n<td width=\"207\">2025-07-21 16:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">162.248.74[.]92<\/span><\/td>\n<td width=\"207\">2025-07-21 14:00<\/td>\n<td width=\"207\">2025-07-21 17:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">38.54.106[.]11<\/span><\/td>\n<td width=\"207\">2025-07-21 15:00<\/td>\n<td width=\"207\">2025-07-21 15:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">206.166.251[.]228<\/span><\/td>\n<td width=\"207\">2025-07-21 16:00<\/td>\n<td width=\"207\">2025-07-22 16:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">45.77.155[.]170<\/span><\/td>\n<td width=\"207\">2025-07-21 16:00<\/td>\n<td width=\"207\">2025-07-21 19:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">64.176.50[.]109<\/span><\/td>\n<td width=\"207\">2025-07-21 17:00<\/td>\n<td width=\"207\">2025-07-22 17:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">149.28.17[.]188<\/span><\/td>\n<td width=\"207\">2025-07-22 03:00<\/td>\n<td width=\"207\">2025-07-22 03:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">173.239.247[.]32<\/span><\/td>\n<td width=\"207\">2025-07-22 05:00<\/td>\n<td width=\"207\">2025-07-22 05:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">109.105.193[.]76<\/span><\/td>\n<td width=\"207\">2025-07-22 05:00<\/td>\n<td width=\"207\">2025-07-22 16:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">2.56.190[.]139<\/span><\/td>\n<td width=\"207\">2025-07-22 06:00<\/td>\n<td width=\"207\">2025-07-22 07:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">141.164.60[.]10<\/span><\/td>\n<td width=\"207\">2025-07-22 07:00<\/td>\n<td width=\"207\">2025-07-22 18:00<\/td>\n<\/tr>\n<tr>\n<td width=\"207\"><span style=\"font-family: courier new, courier, monospace;\">124.56.42[.]75<\/span><\/td>\n<td width=\"207\">2025-07-22 13:00<\/td>\n<td width=\"207\">2025-07-22 18:00<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Determine 2 exhibits the timeline of the assaults coming from the three most energetic IP addresses.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 2. Attacks from the most active IP addresses seen per hour (zero values not shown)\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/07-25\/toolshell\/figure-2.png\" alt=\"Figure 2. Attacks from the most active IP addresses seen per hour\" width=\"\" height=\"\"\/><figcaption><em>Determine 2. Assaults from probably the most energetic IP addresses seen per hour (zero values not proven)<\/em><\/figcaption><\/figure>\n<p>Concerningly, Microsoft has <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/07\/22\/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities\/\" target=\"_blank\" rel=\"noopener\">reported<\/a> that a number of China-aligned menace actors have joined in on the exploitation makes an attempt. From our aspect, we detected a backdoor related to LuckyMouse \u2013 a cyberespionage group that targets primarily governments, telecommunications firms, and worldwide organizations \u2013 on a machine in Vietnam focused by way of ToolShell. At this stage, it stays unclear whether or not the system had been beforehand compromised or if the backdoor was launched through the present assault.<\/p>\n<p>However, China-aligned APT teams have actually seized the chance so as to add the exploit chain to their arsenals: in response to our telemetry, the victims of the ToolShell assaults embody a number of high-value authorities organizations which have been long-standing targets of those teams.<\/p>\n<p>Because the cat is out of the bag now, we count on many extra opportunistic attackers to benefit from unpatched methods. The exploit makes an attempt are ongoing and can certainly proceed. Due to this fact, in case you are utilizing SharePoint Server, the next is beneficial (as per <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/blog\/2025\/07\/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770\/\" target=\"_blank\" rel=\"noopener\">steerage<\/a> from Microsoft):<\/p>\n<ul>\n<li>use solely supported variations,<\/li>\n<li>apply the newest safety updates,<\/li>\n<li>ensure that Antimalware Scan Interface is turned on and configured correctly, with an acceptable cybersecurity answer, and<\/li>\n<li>rotate SharePoint Server ASP.NET machine keys.<\/li>\n<\/ul>\n<blockquote>\n<div><em>For any inquiries about our analysis revealed on WeLiveSecurity, please contact us at <a rel=\"nofollow\" target=\"_blank\" style=\"background-color: #f4f4f4;\" href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/toolshell-an-all-you-can-eat-buffet-for-threat-actors\/mailto:threatintel@eset.com?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=eset-research&amp;utm_term=en\" target=\"_blank\" rel=\"noopener\">threatintel@eset.com<\/a>.\u00a0<\/em><\/div>\n<div><em>ESET Analysis provides personal APT intelligence experiences and knowledge feeds. For any inquiries about this service, go to the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/int\/business\/services\/threat-intelligence\/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=wls-research&amp;utm_content=toolshell-an-all-you-can-eat-buffet-for-threat-actors&amp;sfdccampaignid=7011n0000017htTAAQ\" target=\"_blank\" rel=\"noopener\">ESET Menace Intelligence<\/a> web page.<\/em><\/div>\n<\/blockquote>\n<h2>IoCs<\/h2>\n<p>A complete record of indicators of compromise (IoCs) and samples will be present in <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/eset\/malware-ioc\/tree\/master\/toolshell\" target=\"_blank\" rel=\"noopener\">our GitHub repository<\/a>.<\/p>\n<h3>Recordsdata<\/h3>\n<table style=\"width: 777.312px;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td style=\"width: 180px;\"><strong>SHA-1<\/strong><\/td>\n<td style=\"width: 146px;\"><strong>Filename<\/strong><\/td>\n<td style=\"width: 127px;\"><strong>Detection<\/strong><\/td>\n<td style=\"width: 318.312px;\"><strong>Description<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 180px;\"><span style=\"font-family: courier new, courier, monospace;\">F5B60A8EAD96703080E7<wbr\/>3A1F79C3E70FF44DF271<\/span><\/td>\n<td style=\"width: 146px;\"><span style=\"font-family: courier new, courier, monospace;\">spinstall0.aspx<\/span><\/td>\n<td style=\"width: 127px;\">MSIL\/Webshell.JS<\/td>\n<td style=\"width: 318.312px;\">Webshell deployed by way of SharePoint vulnerabilities<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Community<\/h3>\n<table style=\"width: 780px;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td style=\"width: 149px;\"><strong>IP<\/strong><\/td>\n<td style=\"width: 62px;\"><strong>Area<\/strong><\/td>\n<td style=\"width: 131px;\"><strong>Internet hosting supplier<\/strong><\/td>\n<td style=\"width: 105.344px;\"><strong>First seen<\/strong><\/td>\n<td style=\"width: 182.656px;\"><strong>Particulars<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">96.9.125[.]147<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">BL Networks<\/td>\n<td style=\"width: 105.344px;\">2025-07-17<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">107.191.58[.]76<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">The Fixed Firm, LLC<\/td>\n<td style=\"width: 105.344px;\">2025-07-18<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">104.238.159[.]149<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">The Fixed Firm, LLC<\/td>\n<td style=\"width: 105.344px;\">2025-07-19<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">139.59.11[.]66<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">DigitalOcean, LLC<\/td>\n<td style=\"width: 105.344px;\">2025-07-21<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">154.223.19[.]106<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">Kaopu Cloud HK Restricted<\/td>\n<td style=\"width: 105.344px;\">2025-07-21<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">103.151.172[.]92<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">IKUUU NETWORK LTD<\/td>\n<td style=\"width: 105.344px;\">2025-07-21<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">45.191.66[.]77<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">VIACLIP INTERNET E TELECOMUNICA\u00c7\u00d5ES LTDA<\/td>\n<td style=\"width: 105.344px;\">2025-07-21<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">83.136.182[.]237<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">Alina Gatsaniuk<\/td>\n<td style=\"width: 105.344px;\">2025-07-21<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">162.248.74[.]92<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">xTom GmbH<\/td>\n<td style=\"width: 105.344px;\">2025-07-21<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">38.54.106[.]11<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">Kaopu Cloud HK Restricted<\/td>\n<td style=\"width: 105.344px;\">2025-07-21<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">206.166.251[.]228<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">BL Networks<\/td>\n<td style=\"width: 105.344px;\">2025-07-21<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">45.77.155[.]170<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">Vultr Holdings, LLC<\/td>\n<td style=\"width: 105.344px;\">2025-07-21<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">64.176.50[.]109<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">The Fixed Firm, LLC<\/td>\n<td style=\"width: 105.344px;\">2025-07-21<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">149.28.17[.]188<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">The Fixed Firm, LLC<\/td>\n<td style=\"width: 105.344px;\">2025-07-22<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">173.239.247[.]32<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">GSL Networks Pty LTD<\/td>\n<td style=\"width: 105.344px;\">2025-07-22<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">109.105.193[.]76<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">Haruka Community Restricted<\/td>\n<td style=\"width: 105.344px;\">2025-07-22<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">2.56.190[.]139<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">Alina Gatsaniuk<\/td>\n<td style=\"width: 105.344px;\">2025-07-22<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">141.164.60[.]10<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">The Fixed Firm, LLC<\/td>\n<td style=\"width: 105.344px;\">2025-07-22<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 149px;\"><span style=\"font-family: courier new, courier, monospace;\">124.56.42[.]75<\/span><\/td>\n<td style=\"width: 62px;\">N\/A<\/td>\n<td style=\"width: 131px;\">IP Supervisor<\/td>\n<td style=\"width: 105.344px;\">2025-07-22<\/td>\n<td style=\"width: 182.656px;\">IP deal with exploiting SharePoint vulnerabilities.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>MITRE ATT&amp;CK methods<\/h2>\n<p>This desk was constructed utilizing <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/resources\/versions\/\" target=\"_blank\" rel=\"noopener\">model 17<\/a>\u00a0of the MITRE ATT&amp;CK framework<strong>.<\/strong><\/p>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"113\"><strong>Tactic<\/strong><\/td>\n<td width=\"113\"><strong>ID<\/strong><\/td>\n<td width=\"151\"><strong>Title<\/strong><\/td>\n<td width=\"265\"><strong>Description<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"113\"><strong>Preliminary Entry<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1190\" target=\"_blank\" rel=\"noopener\">T1190<\/a><\/td>\n<td width=\"151\">Exploit Public-Going through Utility<\/td>\n<td width=\"265\">Menace actors exploited CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE\u20112025-53771 to compromise on-premises Microsoft SharePoint servers.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><strong>Execution<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1059\/003\" target=\"_blank\" rel=\"noopener\">T1059.003<\/a><\/td>\n<td width=\"151\">Command and Scripting Interpreter: Home windows Command Shell<\/td>\n<td width=\"265\">The deployed webshells execute attacker-supplied instructions by way of cmd.exe.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><strong>Persistence<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1505\/003\" target=\"_blank\" rel=\"noopener\">T1505.003<\/a><\/td>\n<td width=\"151\">Server Software program Part: Internet Shell<\/td>\n<td width=\"265\">Menace actors deployed webshells to compromised servers.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><strong>Assortment<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v17\/techniques\/T1005\" target=\"_blank\" rel=\"noopener\">T1005<\/a><\/td>\n<td width=\"151\">Knowledge from Native System<\/td>\n<td width=\"265\">The deployed webshells enable the attackers to extract data from the compromised methods.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/int\/business\/services\/threat-intelligence\/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=wls-research&amp;utm_content=toolshell-an-all-you-can-eat-buffet-for-threat-actors&amp;sfdccampaignid=7011n0000017htTAAQ\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/eti-eset-threat-intelligence.png\" alt=\"\" width=\"915\" height=\"296\"\/><\/a><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>ESET Analysis has been monitoring assaults involving the just lately found ToolShell zero-day vulnerabilities 24 Jul 2025 \u00a0\u2022\u00a0 , 5 min. learn On July 19th, 2025, Microsoft confirmed {that a} set of zero-day vulnerabilities in SharePoint Server known as ToolShell is being exploited within the wild. ToolShell is comprised of CVE-2025-53770, a distant code execution [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1161,4335,4336,461],"class_list":["post-5010","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-actors","tag-allyoucaneat","tag-buffet","tag-threat"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5010"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5010\/revisions"}],"predecessor-version":[{"id":5011,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5010\/revisions\/5011"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/5012"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 18:28:57 UTC -->