<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CISA Releases Malware Analysis Report Associated with Microsoft SharePoint Vulnerabilities in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/CISA-Releases-Malware-Analysis-Report-Associated-with-Microsoft/m-p/82904#M7601</link>
    <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CISA published a Malware Analysis Report (MAR) with analysis and associated detection signatures on files related to Microsoft SharePoint vulnerabilities:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-49704 [CWE-94: Code Injection],&lt;BR /&gt;CVE-2025-49706 [CWE-287: Improper Authentication],&lt;BR /&gt;CVE-2025-53770 [CWE-502: Deserialization of Untrusted Data], and&lt;BR /&gt;CVE-2025-53771 [CWE-287: Improper Authentication]&lt;BR /&gt;&lt;BR /&gt;Cyber threat actors have chained CVE-2025-49704 and CVE-2025-49706 (in an exploit chain publicly known as “ToolShell”) to gain unauthorized access to on-premises SharePoint servers. CISA analyzed six files including two Dynamic Link-Library (.DLL), one cryptographic key stealer, and three web shells. Cyber threat actors could leverage this malware to steal cryptographic keys and execute a Base64-encoded PowerShell command to fingerprint host system and exfiltrate data.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CISA added CVE-2025-49704 and CVE-2025-49706 to its Known Exploited Vulnerabilities Catalog on July 22, 2025, and CVE-2025-53770 on July 20, 2025.&lt;/P&gt;&lt;P&gt;CISA encourages organizations to use the indicators of compromise (IOCs) and detection signatures in this MAR to identify malware.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Downloadable copy of IOCs associated with this malware:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisa.gov/news-events/alerts/2025/08/06/cisa-releases-malware-analysis-report-associated-microsoft-sharepoint-vulnerabilities" target="_blank"&gt;https://www.cisa.gov/news-events/alerts/2025/08/06/cisa-releases-malware-analysis-report-associated-microsoft-sharepoint-vulnerabilities&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 07 Aug 2025 01:19:33 GMT</pubDate>
    <dc:creator>Kyaw_Myo_Oo</dc:creator>
    <dc:date>2025-08-07T01:19:33Z</dc:date>
    <item>
      <title>CISA Releases Malware Analysis Report Associated with Microsoft SharePoint Vulnerabilities</title>
      <link>https://community.isc2.org/t5/Industry-News/CISA-Releases-Malware-Analysis-Report-Associated-with-Microsoft/m-p/82904#M7601</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CISA published a Malware Analysis Report (MAR) with analysis and associated detection signatures on files related to Microsoft SharePoint vulnerabilities:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-49704 [CWE-94: Code Injection],&lt;BR /&gt;CVE-2025-49706 [CWE-287: Improper Authentication],&lt;BR /&gt;CVE-2025-53770 [CWE-502: Deserialization of Untrusted Data], and&lt;BR /&gt;CVE-2025-53771 [CWE-287: Improper Authentication]&lt;BR /&gt;&lt;BR /&gt;Cyber threat actors have chained CVE-2025-49704 and CVE-2025-49706 (in an exploit chain publicly known as “ToolShell”) to gain unauthorized access to on-premises SharePoint servers. CISA analyzed six files including two Dynamic Link-Library (.DLL), one cryptographic key stealer, and three web shells. Cyber threat actors could leverage this malware to steal cryptographic keys and execute a Base64-encoded PowerShell command to fingerprint host system and exfiltrate data.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CISA added CVE-2025-49704 and CVE-2025-49706 to its Known Exploited Vulnerabilities Catalog on July 22, 2025, and CVE-2025-53770 on July 20, 2025.&lt;/P&gt;&lt;P&gt;CISA encourages organizations to use the indicators of compromise (IOCs) and detection signatures in this MAR to identify malware.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Downloadable copy of IOCs associated with this malware:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisa.gov/news-events/alerts/2025/08/06/cisa-releases-malware-analysis-report-associated-microsoft-sharepoint-vulnerabilities" target="_blank"&gt;https://www.cisa.gov/news-events/alerts/2025/08/06/cisa-releases-malware-analysis-report-associated-microsoft-sharepoint-vulnerabilities&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Aug 2025 01:19:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/CISA-Releases-Malware-Analysis-Report-Associated-with-Microsoft/m-p/82904#M7601</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2025-08-07T01:19:33Z</dc:date>
    </item>
  </channel>
</rss>

