govt cybersecurity breach alert

How quickly can a single vulnerability unfold into a nationwide cybersecurity crisis affecting critical infrastructure? The answer surfaced in July 2025, when critical vulnerabilities identified as CVE-2025-53770 and CVE-2025-53771 compromised more than 90 state, local government, and critical infrastructure organizations across the United States within days of public disclosure.

Microsoft SharePoint Server vulnerabilities permitted attackers to execute the “ToolShell” exploitation chain, providing arbitrary, unauthenticated command execution on vulnerable servers. CVE-2025-53770, the primary threat vector, permits remote code execution via unsafe deserialization, allowing attackers to run code before authentication occurs. The flaws primarily impact on-premises SharePoint installations, whereas SharePoint Online users remain unaffected.

The vulnerabilities represent sophisticated bypasses of earlier patches addressing CVE-2025-49704 and CVE-2025-49706, indicating initial remediations proved insufficient. Unearthed at Pwn2Own Berlin 2025 by Viettel Cyber Security researchers, these evolved variants exploited gaps in Microsoft’s previous security updates, creating new attack vectors through unsafe deserialization processes.

Federal and state agencies, universities, and energy companies documented compromises as attackers utilized mass scanning and exploitation techniques. The initial wave began July 17-18, 2025, maximizing impact during the critical patch gap window before widespread security updates.

Dozens of compromised servers appeared within days, demonstrating the vulnerability’s severe exploitation potential. Attackers employed specially crafted HTTP requests against the /_layouts/15/ToolPane.aspx endpoint, bypassing authentication through Referer header manipulation to /_layouts/SignOut.aspx. Malicious web shells, including files named spinstall0.aspx, were uploaded to extract cryptographic secrets and facilitate lateral movement through SharePoint environments.

The attack chain abused VIEWSTATE payloads, allowing attackers to forge trusted payloads with stolen machine keys. Microsoft issued emergency patches for SharePoint Subscription Edition and 2019 on July 19, 2025, with SharePoint 2016 Enterprise Server updates undergoing testing. The malicious ASPX files utilized reflective code loading via System.Reflection.Assembly.Load() in C# to execute their payloads dynamically within the SharePoint environment.

Organizations face significant detection challenges, as attackers successfully blend malicious activities with legitimate SharePoint traffic, complicating identification without thorough endpoint visibility and advanced security monitoring capabilities. CISA issued a critical alert identifying Chinese adversaries, including Linen Typhoon, Violet Typhoon, and Storm-2603, as primary threat actors behind the widespread exploitation campaign.

You May Also Like

Chinese Hackers Hijack Cityworks Flaw to Infiltrate U.S. City Governments

Chinese hackers penetrate U.S. cities through innocent-looking software, gaining control of vital water systems. Who’s next in their crosshairs?

Iranian Hackers Eye U.S. Critical Infrastructure—Nation on Alert as Cyber Threats Escalate

Iranian hackers target U.S. critical infrastructure with sophisticated tactics, causing $4.35M in damages per breach. Can your organization withstand their next attack?

CISA Sounds Alarm on Critical Mitsubishi ICS Weaknesses Threatening Global Infrastructure

Critical Mitsubishi ICS flaws expose global air conditioning systems to remote takeover, scoring a near-perfect severity rating. Your building could be next.

Chinese-Speaking Hackers Hijack Cityworks Flaw to Breach US City Networks in 2025

Chinese hackers seized control of American cities through an ordinary maintenance app. New evidence exposes who’s really controlling our infrastructure.