A critical zero‑day exploit chain in on‑premises Microsoft SharePoint servers—nicknamed ToolShell—has set off a widespread wave of Warlock ransomware attacks, compromising over 400 organizations worldwide. Many targets include U.S. federal agencies and sectors like education, transportation, healthcare, and technology.Infosecurity Magazine+11Axios+11IT Pro+11
The attacks center on a chain of four key SharePoint vulnerabilities:
This chain allows threat actors to bypass authentication, execute code remotely, and deploy web shells—even after initial patching efforts.
Microsoft has attributed the campaign to three China-based groups:
Starting July 18, Storm‑2603 began deploying Warlock ransomware payloads across compromised environments. Other actors shifted to opportunistic attacks following PoC release online.
qz.com+8Infosecurity Magazine+8CyberScoop+8
ToolPane
endpoint triggers RCEspinstall0.aspx
or similar for persistencew3wp.exe
injections, scheduled tasks, DLL alterations“This isn’t just a patch issue—it’s a persistence race. Once adversaries steal your machine keys or install webshells, patching alone won’t remove them. You must hunt, isolate, and reset credentials immediately.”
— CyberDudeBivash