• About
  • Advertise
  • Careers
  • Contact Us
Monday, July 21, 2025
  • Login
No Result
View All Result
NEWSLETTER
Tech | Business | Economy
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
Home Business Security

Microsoft Warns of Active Zero-Day Attacks Targeting SharePoint Servers

by Joan Aimuengheuwa
July 21, 2025
in Security
0
Microsoft Warns of attacks on SharePoint Servers
Microsoft Warns of cyber attack

Microsoft Warns of cyber attack

UBA
Advertisements

Microsoft has sounded the alarm over ongoing cyberattacks targeting its SharePoint server software, warning that systems across government agencies, banks, hospitals, and universities are now exposed to severe compromise.

The company confirmed that hackers are exploiting a flaw tracked as CVE-2025-53770—a zero-day vulnerability rated 9.8 out of 10 in severity. In simple terms, attackers don’t need passwords or insider access; they can remotely take over servers using this flaw.

The attack chain, which security researchers have labelled “ToolShell,” is alarmingly effective. It enables cybercriminals to circumvent identity protections, such as multi-factor authentication (MFA) and single sign-on (SSO). 

According to Microsoft, at least 85 servers in 29 organisations globally have already been breached. Affected entities span sensitive sectors: government agencies, financial institutions, hospitals, and universities.

In a direct message to affected customers, Microsoft said: “We’ve been coordinating closely with CISA, DOD Cyber Defense Command and key cybersecurity partners globally throughout our response.”

Here’s how the attack works. Hackers plant a malicious ASPX file, named examples include ‘spinstallo.aspx’, on target servers. Once in place, this file extracts machine key configurations, allowing attackers to forge tokens and execute arbitrary code. 

The result is total control of the compromised system. They can steal cryptographic keys, embed backdoors for persistent access, and deploy further malware undetected.

For those unaware, SharePoint servers are widely used by corporations and governments to share documents internally. While Microsoft’s cloud-based SharePoint Online remains unaffected, its on-premises versions from 2016, 2019, and the Subscription Edition are dangerously exposed.

In plain terms, Microsoft is telling organisations: patch your servers now or risk being hijacked.

The company has issued July 2025 security updates and strongly advised enabling the Antimalware Scan Interface (AMSI) alongside Defender Antivirus. If enabling AMSI is not possible, Microsoft recommends disconnecting servers from the internet entirely until patches are applied.

Additionally, Microsoft recommends rotating ASP.NET machine keys and restarting IIS servers to block ongoing attacks.

Meanwhile, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has escalated its response, adding CVE-2025-53770 to its Known Exploited Vulnerabilities catalogue. U.S. federal agencies have been ordered to patch their servers by July 21, 2025.

The FBI acknowledged the attacks in a brief statement on Sunday, saying it is “aware of the attacks and is working closely with its federal and private-sector partners,” but declined to provide further details.

What makes this breach more worrying is the sophisticated nature of the exploit. According to the initial disclosure by security experts at the Pwn2Own Berlin 2025 event, the ToolShell attack combines two additional vulnerabilities (CVE-2025-49706 and CVE-2025-49704), making it harder to detect and stop.

For organisations yet to patch, the advice is to isolate your servers or risk a full-scale breach.

Cybersecurity professionals globally now face a race against time to close the security gaps before more damage is done.

Loading

Advertisements
MTN ADS

0Shares
Tags: CISA Patch OrderCritical Server ThreatCVE-2025-53770FBI Cyberattack ResponseGovernment Cyber BreachMicrosoftMicrosoft Security AlertMicrosoft Security UpdateMicrosoft SharePoint AttackServer Breach 2025SharePoint Exploit PatchSharePoint Hack 2025SharePoint Servers CompromisedSharePoint VulnerabilitySharePoint Zero-DayToolShell Exploit
Joan Aimuengheuwa

Joan Aimuengheuwa

Joan thrives at helping individuals and businesses scale via storytelling...

Next Post
Bitget Annual Trading Competition KCGI

Bitget Annual Trading Competition KCGI Launches with $6 Million Prize Pool

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recommended

NIMC Partners Renewed Hope NHGSF to Enhance School Feeding Scheme with NIN Integration

NIMC Partners with RH-NHGSF to Enhance School Feeding Scheme with NIN Integration

6 months ago
Easter gateway Travel

Maximise Your Easter Getaway in Nigeria with Smart Travel Hacks

3 months ago

Popular News

    Connect with us

    • About
    • Advertise
    • Careers
    • Contact Us

    © 2025 TECHECONOMY.

    No Result
    View All Result
    • News
    • Tech
      • DisruptiveTECH
      • ConsumerTech
      • How To
      • TechTAINMENT
    • Business
      • Telecoms
      • Mobility
      • Environment
      • Travel
      • StartUPs
        • Chidiverse
      • TE Insights
      • Security
    • Partners
    • Economy
      • Finance
      • Fintech
      • Digital Assets
      • Personal Finance
      • Insurance
    • Features
      • IndustryINFLUENCERS
      • Guest Writer
      • EventDIARY
      • Editorial
      • Appointment
    • TECHECONOMY TV
    • Apply
    • TBS
    • BusinesSENSE For SMEs

    © 2025 TECHECONOMY.

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In
    Translate »
    This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.