china hackers deploy ransomware

As cybersecurity experts continue analyzing the fallout from a devastating series of attacks that began in mid-July 2025, Chinese state-linked threat actors have successfully compromised more than 400 organizations worldwide through sophisticated exploitation of SharePoint vulnerabilities, deploying Warlock ransomware and other malicious payloads across critical infrastructure sectors.

Storm-2603, identified as the primary China-based group orchestrating these attacks, has exploited multiple SharePoint vulnerabilities including CVE-2025-53770, CVE-2025-53771, CVE-2025-49706, and CVE-2025-49704 to gain unauthorized access to sensitive systems. Microsoft tracks these “Storm” groups as factions actively developing capabilities, linking them directly to Chinese government interests focused on espionage and intellectual property theft.

Chinese state-linked Storm-2603 exploited four critical SharePoint vulnerabilities to compromise sensitive systems across hundreds of global organizations.

The attack methodology, dubbed “ToolShell” by security researchers, involves chaining vulnerabilities to bypass identity controls and establish privileged access through custom web shell payloads such as spinstall0.aspx. Once inside target networks, attackers execute commands, validate privileges, disable Microsoft Defender protections, and maintain persistence using batch scripts and malicious .NET assemblies.

Multiple US government agencies have fallen victim to these coordinated attacks, including the Departments of Energy, Homeland Security, Health and Human Services, Education, and the National Nuclear Security Administration.

The California Independent System Operator also confirmed compromise, highlighting the broad scope targeting energy, health, education, government, defense, technology, and human rights organizations.

Warlock ransomware represents the culmination of these intrusion campaigns, deployed after attackers modify group policy settings on compromised SharePoint servers. Storm-2603 has previously utilized both Warlock and LockBit ransomware variants, indicating an evolving toolkit designed to maximize financial impact during disrupting critical operations.

Additional China-linked groups, Linen Typhoon and Violet Typhoon, have concurrently exploited similar SharePoint vulnerabilities, suggesting coordinated efforts across multiple threat actor teams. These groups maintain long-term access through scheduled tasks, registry tampering to disable security protections, and Machine Keys theft that persists even after security patches are applied.

Microsoft has released security updates addressing these SharePoint vulnerabilities across 2016, 2019, and Subscription Edition platforms.

However, the rapid global expansion of attacks demonstrates the critical urgency organizations face in implementing extensive defensive measures against sophisticated state-sponsored cyber operations.

You May Also Like

How One Ransomware Gang Crippled Ingram Micro on Independence Day—and Why It Matters

A massive ransomware attack paralyzed tech giant Ingram Micro on July 4th, exposing a terrifying truth about holiday cybersecurity nobody saw coming.

Play Ransomware Wreaks Havoc: 600 Organizations Hit Since 2023, Says FBI

FBI reveals staggering Play ransomware assault on 600+ organizations, with hackers demanding millions through a twisted double-extortion scheme. Your company might be next.

FBI Confirms ‘Play’ Ransomware Infiltrated 900 Victims — Critical Infrastructure Among Targets

FBI confirms major cyber assault: Play ransomware hits 900 organizations, including critical infrastructure, while federal authorities scramble to contain the damage.

Ransomware Gangs Hijack SharePoint Servers Even After Patching, Microsoft Confirms Alarming Tactic

Even after patching, ransomware gangs found a way to hijack SharePoint servers worldwide. Microsoft confirms over 400 organizations fell victim to this devious tactic.