TRJ CYBERSECURITY INTEL REPORT | July 21, 2025
Category: Enterprise Collaboration Software Exploit
Features: Remote Code Execution, Cryptographic Key Theft, Persistent Access, MFA Bypass
Delivery Method: Internet-exposed On-Prem SharePoint Servers
Threat Actor: Unknown Advanced Persistent Threat(s) — Suspected State-Aligned or Industrial Espionage
SYSTEMS BREACHED — And They May Stay Breached Even After Patching
A critical zero-day vulnerability is currently being actively exploited in the wild, targeting on-premise Microsoft SharePoint servers worldwide. Microsoft confirmed the threat over the weekend in an emergency bulletin, identifying it as CVE-2025-53770, a severe Remote Code Execution (RCE) flaw that permits attackers to seize control of vulnerable servers, bypass authentication mechanisms, and extract sensitive credentials and cryptographic material.
What sets this exploit apart — and makes it exceptionally dangerous — is that attackers are compromising the cryptographic backbone of SharePoint systems, enabling persistent access even after the vulnerable systems are patched.
Patch ≠ Protection
According to Charles Carmakal, CTO of Google Cloud’s Mandiant, “This isn’t a patch-and-move-on situation.” Organizations must immediately implement network-level mitigations, full forensic analysis, and cryptographic key recycling. Attackers have already gained privileged access, bypassed MFA and SSO, and implanted backdoors for long-term surveillance.
EXPLOIT TIMELINE: WAVE-BASED ATTACKS UNDERWAY
European cybersecurity firm Eye Security was the first to confirm live exploitation, documenting two separate attack waves beginning late Friday, July 18. Their scans revealed dozens of compromised systems, many within government, education, healthcare, and critical infrastructure.
Their findings were corroborated by watchTowr and Palo Alto’s Unit 42, which have independently verified that government agencies, hospitals, school districts, and multinational tech firms are already compromised.
“These aren’t opportunistic hits,” said Benjamin Harris of watchTowr. “This is coordinated, high-level, and global in scale. The volume and targeting strongly suggest a state-aligned APT or black-market industrial espionage operation.”
DEEPER DAMAGE: CRYPTOKEYS STOLEN, MFA NEUTRALIZED
The attackers didn’t stop at intrusion. They’re exfiltrating internal SharePoint cryptographic keys — the foundational secrets that verify software and user authenticity. The theft of these keys means:
- Backdoors remain operational even post-patch
- MFA and SSO controls are bypassed
- Trusted SharePoint communications may now be spoofed
- Secure data can be intercepted, modified, or destroyed
Michael Sikorski, CTO of Palo Alto’s Unit 42, emphasized the longer-term damage:
“If you run on-prem SharePoint exposed to the internet, assume full compromise. You’re not just patching a hole — you’re trying to regrow the walls while the enemy is already inside.”
MICROSOFT RESPONSE & FEDERAL MANDATE
Microsoft published mitigation guidance Saturday and followed up with an emergency patch early Monday morning. The patch covers all versions except SharePoint Server 2016, and also addresses a second, lower-severity flaw (CVE-2025-53771).
However, Microsoft has not yet published full remediation guidance for cryptographic key rotation, leading to significant concerns among CISOs and federal defense partners.
In response, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a rapid inclusion of CVE-2025-53770 into its Known Exploited Vulnerabilities (KEV) catalog, setting a mandatory remediation deadline for federal agencies of July 21, 2025 — a record turnaround time, matching the urgency seen with this month’s Citrix Bleed 2 disclosure.
TRJ RECOMMENDATIONS
If your organization runs SharePoint on-premise, especially if it is exposed to the internet, assume active compromise. Implement the following immediately:
- Disconnect vulnerable SharePoint servers from external networks.
- Apply Microsoft’s patch for CVE-2025-53770 and CVE-2025-53771 (if eligible).
- Conduct full forensic investigation of server logs and memory dumps.
- Rotate all cryptographic keys and certificates associated with SharePoint authentication, session handling, and API usage.
- Audit for unusual or persistent backdoor connections, especially beaconing C2 behavior.
- Temporarily disable or restrict SSO, OAuth, and MFA bridging, and reissue tokens.
- Assume data exfiltration — verify DLP systems and check for outbound payloads.
TRJ BLACK FILE: UNDERGROUND SIGNALS
Codenamed: “Shadow Share,” private dark web chatter hints that the exploit for CVE-2025-53770 was first sold in limited circulation in April 2025 to at least two nation-state-aligned actors, one suspected to be China-affiliated and the other a proxy group aligned with Russian intelligence. The exploit package allegedly includes:
- A SharePoint-specific RCE loader
- Scripts to extract and decrypt key containers
- Payloads to implant obfuscated .NET-based backdoors
- MFA token interceptors and exfiltration tools
One seller described it as “a ghost inside SharePoint — clean, untraceable, and recursive.” If accurate, this level of access would place compromised organizations in a long-term vulnerability loop, vulnerable to re-activation at any time regardless of surface patching.
FINAL VERDICT
This is not just a vulnerability — it’s a weaponized foothold.
Any organization still running internet-facing on-prem SharePoint is now a priority target.
Patching is not a cure. It’s only the beginning of a much harder battle to reclaim trust, secrets, and system integrity.
Rebuild. Revoke. Reassess. Repeat.
The attackers already have the keys.
It’s time we change the locks — and check the cameras.
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 1 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed.
🔥 Kindle Edition 👉 https://a.co/d/9EoGKzh
🔥 Paperback 👉 https://a.co/d/9EoGKzh
🔥 Hardcover Edition 👉 https://a.co/d/0ITmDIB
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 2 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed just like the first one.
🔥 Kindle Edition 👉 https://a.co/d/1xlx7J2
🔥 Paperback 👉 https://a.co/d/a7vFHN6
🔥 Hardcover Edition 👉 https://a.co/d/efhu1ON
Get your copy today and experience poetry like never before. #InkAndFire #PoetryUnleashed #FuelTheFire
🚨 NOW AVAILABLE! 🚨
📖 THE INEVITABLE: THE DAWN OF A NEW ERA 📖
A powerful, eye-opening read that challenges the status quo and explores the future unfolding before us. Dive into a journey of truth, change, and the forces shaping our world.
🔥 Kindle Edition 👉 https://a.co/d/0FzX6MH
🔥 Paperback 👉 https://a.co/d/2IsxLof
🔥 Hardcover Edition 👉 https://a.co/d/bz01raP
Get your copy today and be part of the new era. #TheInevitable #TruthUnveiled #NewEra
🚀 NOW AVAILABLE! 🚀
📖 THE FORGOTTEN OUTPOST 📖
The Cold War Moon Base They Swore Never Existed
What if the moon landing was just the cover story?
Dive into the boldest investigation The Realist Juggernaut has ever published—featuring declassified files, ghost missions, whistleblower testimony, and black-budget secrets buried in lunar dust.
🔥 Kindle Edition 👉 https://a.co/d/2Mu03Iu
🛸 Paperback Coming Soon
Discover the base they never wanted you to find. TheForgottenOutpost #RealistJuggernaut #MoonBaseTruth #ColdWarSecrets #Declassified
Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a

