SharePoint customers hit by Warlock ransomware, says Microsoft
A number of organisations have now been hit by Warlock ransomware deployed on their techniques through the damaging ToolShell vulnerability chain in Microsoft SharePoint Server, Microsoft has revealed.
Earlier this week, Microsoft stated that recognized Chinese language state risk actors, Linen Hurricane and Violet Hurricane, had been amongst these exploiting two safety bypass vulnerabilities – CVE-2025-53770, which bypasses a distant code execution (RCE) flaw tracked as CVE-2025-49704, and CVE-2025-53771, which bypasses a spoofing flaw, CVE-2025-49706.
It additionally tentatively attributed some exercise to an as-yet unclassified risk actor, Storm-2603, noting that this group had demonstrated some ties to ransomware gangs resembling LockBit prior to now.
Having firmed up a hyperlink to Warlock, Microsoft has now up to date info on attribution, indicators of compromise (IoCs), mitigation and safety steerage, and detection and risk looking.
As of 23 July, knowledge sourced from the Shadowserver Basis suggests near 600 SharePoint situations are uncovered to the online within the UK – the worldwide determine is nearer to 11,000.
Worldwide, the organisation stated that about 424 of the full remained susceptible to CVE-2025-53770 and CVE-2025-53771 as of 23 July. A couple of quarter of those situations are positioned within the US.
In an announcement, the UK’s Nationwide Cyber Safety Centre (NCSC) stated: “Microsoft and the NCSC are conscious that an exploit for this vulnerability exists within the wild and have noticed lively assaults concentrating on on-premises SharePoint Server clients, together with a restricted quantity within the UK.”
On the time of writing, no ToolShell victims within the UK have been publicly named. Within the US, based on Bloomberg – which cited sources conversant in the incident – the Nationwide Nuclear Safety Administration (NNSA) is amongst these to have fallen sufferer.
The NNSA’s core mission is to guarantee the protected upkeep and administration of US nuclear weapons.
Confirmed by the Division of Power, which it in the end sits inside, the NNSA was described as “minimally impacted” by the assault.
The company stated that different US federal and state our bodies, and governments in Europe and the Center East, had doubtless been affected, whereas the Washington Put up has added the Nationwide Institute of Well being (NIH) to the checklist.
SharePoint customers left utterly uncovered
Kevin Robertson, chief know-how officer at managed detection and response (MDR) specialist Acumen Cyber, stated the failure of the primary patches for CVE-2025-49704 and CVE-2025-29706 to totally handle the sooner points – each addressed within the July 2025 Patch Tuesday drop – had left organisations utterly uncovered.
“The attackers turning to ransomware are clearly making the most of CVE 2025-53770 to achieve additional entry to environments, encrypting delicate info, earlier than executing ransomware hoping to get a giant paycheck,” stated Robertson.
“This highlights that it’s not simply state-sponsored risk actors benefiting from this harmful vulnerability. Cash-motivated attackers are additionally leaping on the bandwagon. ”
Nevertheless, some state-sponsored attackers will even be utilizing ransomware. They might be conducting reconnaissance on networks after which, after they have what they want, dropping ransomware to trigger additional chaos for victims.
“Whereas we now have knowledge saying 400 victims have been compromised, this might be a drop within the ocean compared with the fact. Moreover, not all organisations may have been capable of apply the patch but, that means their environments are nonetheless broad open,” he added.

