Bottom Line Up Front: A critical zero-day vulnerability in Microsoft SharePoint Server (CVE-2025-53770) has been actively exploited since July 7, 2025, compromising thousands of servers worldwide. Attackers are stealing cryptographic keys that allow persistent access even after patching. Organizations must act promptly to safeguard their infrastructure and explore more secure alternatives for file sharing and collaboration.
The SharePoint ToolShell attack represents one of the most significant cybersecurity incidents of 2025. What started as a targeted attack on high-value organizations has rapidly evolved into a global campaign affecting tens of thousands of servers, creating a cybersecurity emergency that spans continents and industries.
Check Point Research observed the first exploitation attempts as early as July 7, 2025, targeting a major Western government, with activity intensifying on July 18 and 19 across government, telecommunications, and software sectors in North America and Western Europe. The attack’s rapid expansion demonstrates how quickly sophisticated threat actors can weaponize newly discovered vulnerabilities.
Microsoft has identified multiple threat actors exploiting these vulnerabilities, including two named Chinese nation-state actors: Linen Typhoon and Violet Typhoon, as well as Storm-2603, another China-based threat actor that has evolved from espionage to deploying ransomware. This evolution from data theft to destructive attacks signals a dangerous escalation in cybercriminal tactics.
The involvement of state-sponsored groups adds a geopolitical dimension to what initially appeared to be a technical security issue. SentinelOne has observed multiple state-aligned threat actors beginning reconnaissance and early-stage exploitation activities, with some actors potentially setting up decoy honeypot environments to collect and test exploit implementations.
The vulnerabilities, collectively referred to as “ToolShell,” were originally disclosed by Viettel Cyber Security during the Pwn2Own 2025 hacking competition in May. The attack chain exploits multiple vulnerabilities working in sequence:
The malicious activity involves delivering ASPX payloads via PowerShell to steal the SharePoint server’s MachineKey configuration, including the ValidationKey and DecryptionKey, to maintain persistent access. These keys are crucial for generating valid __VIEWSTATE payloads, effectively turning any authenticated SharePoint request into a remote code execution opportunity.
This sophisticated approach means that simply applying Microsoft’s patches may not fully protect compromised systems. Eye Security warns that because the bug involves the theft of digital keys that can be used to impersonate legitimate requests on the server, affected customers must both patch the bug and take additional steps to rotate their digital keys to prevent hackers from recompromising the server.
The attack has struck at the heart of critical infrastructure. Several U.S. federal agencies, universities, and energy companies have already been breached in the attacks, with some state cybersecurity officials reporting a “mad scramble across the nation” to assess vulnerabilities.
CISA and other security agencies are working to notify potentially impacted entities, with the vulnerability being added to CISA’s Known Exploited Vulnerabilities catalog, signaling the severity of the threat to national security infrastructure.
SharePoint’s integration with other Microsoft services amplifies the impact of these breaches. Eye Security warns that SharePoint connects with other apps like Outlook, Teams, and OneDrive, which may enable further network compromise and data theft. This interconnectedness means a single SharePoint compromise can quickly spread throughout an organization’s entire digital ecosystem.
The Cybersecurity and Infrastructure Security Agency (CISA) has issued comprehensive guidance recommending immediate patching, enabling anti-malware scan interface (AMSI) in SharePoint, and deploying Microsoft Defender AV on all SharePoint servers. The Department of Homeland Security has also coordinated with international partners to address the global scope of the threat.
DOD Cyber Defense organizations are particularly concerned given the targeting of federal agencies and the potential for lateral movement within government networks. The attack’s sophistication and state-sponsored nature align with threats that defense cybersecurity teams train to counter.
Security experts emphasize that patching alone is insufficient. Organizations must assume compromise and conduct thorough forensic investigations. CISA advises vulnerable organizations to disconnect affected products from the public-facing Internet until official patches are available and to conduct comprehensive threat hunting.
In the rush to secure SharePoint environments, many organizations are discovering that their current file sharing and collaboration solutions create significant vulnerabilities. Traditional protocols like FTP and TCP-based transfers that SharePoint relies on have inherent security and performance limitations that make them attractive targets for attackers.
The SharePoint crisis highlights why organizations need to consider the relationship between network performance and security. When file transfers are slow due to latency issues over long distances, organizations often implement workarounds that bypass security controls. This creates additional attack vectors that sophisticated threat actors can exploit.
Modern secure file transfer solutions that optimize throughput while maintaining security can eliminate these compromised workarounds. By ensuring fast, reliable transfers regardless of distance or network conditions, organizations reduce the temptation to use unsecured methods that create additional risk.
The SharePoint ToolShell attack underscores the risks of relying on legacy on-premises systems for critical file sharing and collaboration. Organizations need solutions that provide the security, speed, and reliability required for modern business operations without the vulnerabilities inherent in older architectures.
Aspera’s approach through PacGenesis offers a compelling alternative that addresses the core issues exposed by the SharePoint crisis. Unlike traditional protocols that SharePoint depends on, Aspera’s patented FASP technology provides:
Additionally, PacGenesis has partnered with Trend Micro to ensure virtual patching for major security incidents like this. With Trend Micro and IBM Aspera, PacGenesis offers ‘best of breed’ solutions for customer infrastructure, security and collaboration.
PacGenesis’s managed Aspera deployments provide an additional security layer by removing the burden of infrastructure management from internal IT teams. This approach addresses one of the key vulnerabilities exposed in the SharePoint attacks: the challenge of maintaining security across complex, distributed systems.
With a fully managed solution, organizations benefit from:
The SharePoint crisis should prompt a broader evaluation of file sharing and collaboration infrastructure. Organizations should assess whether their current solutions provide adequate security for today’s threat environment while meeting performance requirements for global operations.
Consider solutions that offer:
The SharePoint ToolShell attack serves as a critical reminder that cybersecurity is not just about having the latest patches, but about building resilient infrastructure that can withstand sophisticated, persistent threats. The attack’s success demonstrates how interconnected systems can amplify the impact of a single vulnerability.
Organizations that emerge stronger from this crisis will be those that use it as an opportunity to modernize their approach to secure file transfer and collaboration. By investing in purpose-built security solutions rather than continuing to rely on legacy systems with retrofitted security measures, they can significantly reduce their exposure to future attacks.
The speed at which this attack spread globally, the sophistication of the techniques used, and the involvement of state-sponsored actors all point to a threat environment that requires a fundamentally different approach to cybersecurity. Traditional reactive patching is no longer sufficient; organizations need proactive security architectures designed to withstand advanced persistent threats.
As the investigation into the SharePoint ToolShell attack continues, one thing is clear: the organizations that will thrive in this new threat environment are those that prioritize security, performance, and reliability in their core infrastructure decisions. The choice of secure file transfer and collaboration tools is no longer just an IT decision; it’s a business resilience imperative that requires executive-level attention and investment.
When deploying Trend Micro solutions through PacGenesis, our goal is to make onboarding and support…
Email remains one of the most common methods for sharing files in today's digital workplace.…
To combat these modernized attacks, cybersecurity is an ever-evolving segment of data protection that looks…
Ingram Micro has spotlighted PacGenesis as a hyperscaler marketplace success story. This recognition stems from…
TL;DR: Security researchers discovered "BadCam," a critical vulnerability affecting Lenovo 510 FHD and Performance FHD…
IBM Aspera has several web applications available to enable high-speed data transfer for you and…