Yaniv Radunsky
Yaniv Radunsky @hasamba ·
Huntress found threat actors abusing Velociraptor for C2 after exploiting ToolShell (CVE-2025-49706) on SharePoint; MSI payloads traced to a common workers.dev host and a reused Cloudflare tunnel tag. #velociraptor #toolshell #CVE2025-49706 huntress.com/blog/velocirap…
Velociraptor Misuse, Pt. II: The Eye of the Storm | Huntress

Huntress reports an uptick in threat actors abusing the Velociraptor open-source DFIR tool, linked to incidents involving WSUS exploitation, VS Code tunnels, and more.

From huntress.com
1
166
Mr.Rabbit
Mr.Rabbit @01ra66it ·
新報告:SharePointのToolShell脆弱性 (CVE-2025-53770/53771) を狙い、Webシェルではなくインメモリ実行型ペイロードが使われている。ネットワークログ&PCAPでのハンティング必須。#SharePoint #ToolShell #SANSISC isc.sans.edu/diary/32524
SANS Internet Storm Center
[Guest Diary] Hunting for SharePoint In-Memory ToolShell Payloads

[Guest Diary] Hunting for SharePoint In-Memory ToolShell Payloads, Author: Jesse La Grew

From isc.sans.edu
2
685
Cybersecurity News Everyday
Cybersecurity News Everyday @TweetThreatNews ·
Warlock ransomware surfaced mid-2025 via exploitation of a Microsoft SharePoint zero-day (CVE-2025-53770), linked to China-backed group Storm-2603 using reused stolen certs and DLL sideloading techniques. #China #ToolShell #LockBit ift.tt/lZ8enaR
Warlock Ransomware: Old Actor, New Tricks?

Warlock emerged in June–July 2025 after being deployed via exploitation of the ToolShell Microsoft SharePoint zero-day (CVE-2025-53770) by a China-linked actor tracked as Storm-2603, which also used...

From hendryadrian.com
300
Brier & Thorn México
Brier & Thorn México @BrierandThornMX ·
Actores de amenazas con vínculos con China explotaron la vulnerabilidad de seguridad de #ToolShell en #MicrosoftSharePoint para atacar a una empresa de telecomunicaciones en Medio Oriente. #2025 #Infosec #BT thehackernews.com/2025/10/chines…
Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft's July Patch

Chinese threat actors exploited a patched SharePoint flaw, CVE-2025-53770, in global espionage attacks.

From thehackernews.com
3