HowsMyPassword

Your All-in-One Password Security Hub

Defending Against the 'ToolShell' SharePoint Zero-Day Attacks Linked to Chinese Hackers

HowsMyPassword Team
July 22, 2025
Defending Against the 'ToolShell' SharePoint Zero-Day Attacks Linked to Chinese Hackers - Featured Image

Critical Microsoft SharePoint Vulnerability: What You Need to Know About the 'ToolShell' Attacks

Heads up, everyone - we've got a serious situation with Microsoft SharePoint that needs your immediate attention. Chinese hacking groups are actively exploiting some nasty vulnerabilities, and if you're running SharePoint servers, you need to act on this right now.

What's Actually Happening?

Microsoft just revealed that several Chinese hacking groups (with fancy names like Linen Typhoon and Storm-2603) are using something called the 'ToolShell' vulnerability chain to break into SharePoint servers. Think of it as finding not just one unlocked door, but a series of connected weaknesses that let attackers walk right through your security.

The scary part? These aren't just random hackers - we're talking about state-backed groups with serious resources. They're using two major vulnerabilities (CVE-2025-53770 and CVE-2025-53771) to basically get full control of SharePoint systems.

Why This Is Such a Big Deal

If your organization uses SharePoint (and let's be honest, most do), here's what these attackers can do once they're in:

  • Access all your SharePoint content (documents, data, everything)

  • Move around in your network

  • Plant backdoors for future access

  • Potentially access other connected systems

Immediate Steps to Protect Your Systems

First things first - if you're running SharePoint, you need to:

  1. Install Microsoft's security patches IMMEDIATELY

  2. Check your systems for signs of compromise using Microsoft's shared indicators

  3. Monitor your SharePoint servers for unusual activity

  4. Review your remote access settings

Securing Remote Access

Speaking of remote access - this is where a lot of organizations are vulnerable. If you're allowing remote SharePoint access (and who isn't these days), you absolutely need to lock this down. One of the most effective ways is using a business-grade VPN to create a secure tunnel for remote workers.

I've seen a lot of organizations have success with NordVPN's business solution specifically because it supports site-to-site connections and has built-in threat protection. For smaller teams, Private Internet Access offers solid business features at a more accessible price point.

Long-term Prevention Strategies

While patching this specific vulnerability is crucial, here's what you need to do to prevent similar issues in the future:

  • Set up automatic updates for SharePoint and related systems

  • Implement strict access controls

  • Regular security audits of your SharePoint configuration

  • Keep backups of your SharePoint content (separate from your main system)

Signs Your System Might Be Compromised

Watch out for these red flags:

  • Unusual admin account activity

  • Strange files appearing in your SharePoint directories

  • Unexpected outbound network connections

  • Changes to SharePoint permissions or configurations you didn't authorize

If you spot any of these, disconnect the affected systems immediately and bring in your security team.

Next Steps

Don't wait on this one. These vulnerabilities are actively being exploited right now, and the longer you wait to patch, the bigger the risk. If you need help figuring out if you're affected or what to do next, Microsoft's security team has published detailed guidance, or reach out to your IT security provider ASAP.

Quick heads up:Some links in this article are affiliate links. If you buy something through them, we might earn a small commission (doesn't cost you extra). We only recommend stuff we'd actually use ourselves or set up for our own families. No BS recommendations here.

Share this article

Secure Your Accounts Now

Ready to put this knowledge into action? Use our free security tools to protect your accounts.

Related Articles