china hackers deploy ransomware

As cybersecurity experts continue analyzing the fallout from a devastating series of attacks that began in mid-July 2025, Chinese state-linked threat actors have successfully compromised more than 400 organizations worldwide through sophisticated exploitation of SharePoint vulnerabilities, deploying Warlock ransomware and other malicious payloads across critical infrastructure sectors.

Storm-2603, identified as the primary China-based group orchestrating these attacks, has exploited multiple SharePoint vulnerabilities including CVE-2025-53770, CVE-2025-53771, CVE-2025-49706, and CVE-2025-49704 to gain unauthorized access to sensitive systems. Microsoft tracks these “Storm” groups as factions actively developing capabilities, linking them directly to Chinese government interests focused on espionage and intellectual property theft.

Chinese state-linked Storm-2603 exploited four critical SharePoint vulnerabilities to compromise sensitive systems across hundreds of global organizations.

The attack methodology, dubbed “ToolShell” by security researchers, involves chaining vulnerabilities to bypass identity controls and establish privileged access through custom web shell payloads such as spinstall0.aspx. Once inside target networks, attackers execute commands, validate privileges, disable Microsoft Defender protections, and maintain persistence using batch scripts and malicious .NET assemblies.

Multiple US government agencies have fallen victim to these coordinated attacks, including the Departments of Energy, Homeland Security, Health and Human Services, Education, and the National Nuclear Security Administration.

The California Independent System Operator also confirmed compromise, highlighting the broad scope targeting energy, health, education, government, defense, technology, and human rights organizations.

Warlock ransomware represents the culmination of these intrusion campaigns, deployed after attackers modify group policy settings on compromised SharePoint servers. Storm-2603 has previously utilized both Warlock and LockBit ransomware variants, indicating an evolving toolkit designed to maximize financial impact during disrupting critical operations.

Additional China-linked groups, Linen Typhoon and Violet Typhoon, have concurrently exploited similar SharePoint vulnerabilities, suggesting coordinated efforts across multiple threat actor teams. These groups maintain long-term access through scheduled tasks, registry tampering to disable security protections, and Machine Keys theft that persists even after security patches are applied.

Microsoft has released security updates addressing these SharePoint vulnerabilities across 2016, 2019, and Subscription Edition platforms.

However, the rapid global expansion of attacks demonstrates the critical urgency organizations face in implementing extensive defensive measures against sophisticated state-sponsored cyber operations.

You May Also Like

How BERT Ransomware Knocks Out VMware ESXi Hosts to Cripple Recovery Before Demanding Ransom

This new ransomware unleashes chaos by killing virtual machines and destroying backups before demanding payment. Your ESXi infrastructure could be next.

Terrifying Signs Hackers Are Already Inside: Stop a Ransomware Attack Before It’s Too Late

Hackers might already control your network right now. Learn the 5 warning signs that reveal if you’re next on their ransomware hit list.

Ransomware Explodes 46% as Industrial OT Systems Become Prime Cybercrime Targets in 2025

Industrial systems are now cybercriminals’ favorite prey, with ransomware attacks skyrocketing 46% and wreaking $57 billion in damages. Your operations could be next.

Ransomware Gangs Hijack Unpatched SimpleHelp Servers to Rip Through Critical Systems Worldwide

Ransomware gangs weaponize SimpleHelp servers worldwide, leaving a devastating trail of 510 victims. Your organization could be next if critical patches aren’t deployed.