Site icon TheCyberThrone

Storm-2603 Exploiting SharePoint Flaws

Advertisements

Overview

Storm-2603 is a China-based advanced threat actor actively exploiting a series of critical vulnerabilities in on-premises Microsoft SharePoint servers since mid-2025. Their attacks focus on gaining unauthorized access, stealing credentials, disabling security controls, and ultimately deploying the destructive Warlock ransomware across victim networks. These exploits leverage complex chains of vulnerabilities in SharePoint server versions 2016, 2019, and Subscription Edition, affecting only on-premises deployments, not SharePoint Online.

Key Vulnerabilities Exploited

CVE-2025-49704 Remote Code Execution (RCE) Allows unauthenticated upload of .aspx files (web shells) enabling remote command execution.

CVE-2025-49706 Network Spoofing / Authentication Bypass Enables attackers to spoof requests and bypass authentication controls.

CVE-2025-53770 Patch Bypass for RCE Negates previous security patches, allowing persistence and re-exploitation.

CVE-2025-53771 Patch Bypass for Spoofing Bypasses earlier security mitigations for spoofing attacks.

Note: These affect only on-premises SharePoint servers.

Detailed Exploitation Steps & Notes

1. Reconnaissance and Targeting

2. Initial Compromise via Vulnerability Chaining

3. Post-Exploitation Actions

4. Persistence Mechanisms

5. Credential Theft & Lateral Movement

6. Ransomware Deployment

Detection Indicators and Suggested Monitoring

Defensive Recommendations

Conclusion

Storm-2603 exemplifies a sophisticated, evolving threat leveraging chained SharePoint vulnerabilities combined with stealthy in-memory payloads to maintain deep network access and inflict severe ransomware damage. Organizations should prioritize patching, continuous monitoring, and proactive incident response to counter these attacks.

Exit mobile version