The National Nuclear Security Administration (NNSA), a U.S. federal agency responsible for nuclear security, was confirmed as one of the high-profile victims of the ToolShell vulnerability (CVE-2025-53770) campaign. Chinese state-backed threat actors, including groups like Linen Typhoon and Violet Typhoon, exploited this critical SharePoint flaw to gain unauthorized access. The breach involved the deployment of advanced malware such as Zingdoor (a backdoor for credential theft and persistence) and KrustyLoader, alongside legitimate tools like Sliver and Certutil to evade detection. The attackers focused on espionage, stealing sensitive credentials and maintaining long-term, stealthy access within NNSA’s networks. Given the agency’s role in managing the U.S. nuclear weapons stockpile, nuclear nonproliferation, and counterterrorism, the compromise poses severe risks to national security, intellectual property, and classified defense information. While the full scope of data exfiltration remains undisclosed, the involvement of state-sponsored actors suggests targeted theft of high-value intelligence. The breach aligns with a broader pattern of Chinese cyber operations aiming to undermine critical infrastructure and strategic sectors, with potential cascading effects on global security stability.
Source: https://therecord.media/sharepoint-toolshell-bug-breaches-governments-africa-south-america
TPRM report: https://www.rankiteo.com/company/national-nuclear-security-administration
"id": "nat3102231102325",
"linkid": "national-nuclear-security-administration",
"type": "Breach",
"date": "6/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization’s existence"
{'affected_entities': [{'industry': 'Telecommunications',
'location': 'Middle East',
'name': 'Telecom Company (Middle East)',
'type': 'Private Sector'},
{'industry': 'Public Administration',
'location': 'Africa',
'name': 'Two Government Departments (African Country)',
'type': 'Government'},
{'industry': 'Public Administration',
'location': 'South America',
'name': 'Two Government Agencies (South America)',
'type': 'Government'},
{'industry': 'Higher Education',
'location': 'United States',
'name': 'U.S. University',
'type': 'Education'},
{'industry': 'Technology',
'location': 'Africa',
'name': 'State Technology Agency (African Country)',
'type': 'Government'},
{'industry': 'Public Administration',
'location': 'Middle East',
'name': 'Government Department (Middle East)',
'type': 'Government'},
{'industry': 'Financial Services',
'location': 'Europe',
'name': 'Finance Company (European Country)',
'type': 'Private Sector'},
{'industry': 'National Security',
'location': 'United States',
'name': 'National Nuclear Security Administration '
'(NNSA)',
'type': 'Government'},
{'industry': 'Health',
'location': 'United States',
'name': 'National Institutes of Health (NIH)',
'type': 'Government'},
{'industry': 'Public Safety',
'location': 'United States',
'name': 'Department of Homeland Security (DHS)',
'type': 'Government'}],
'attack_vector': ['Exploitation of Public-Facing Application (CVE-2025-53770 '
'in Microsoft SharePoint)',
'Mass Scanning for Vulnerable Systems',
'Malware Deployment (Zingdoor, ShadowPad, KrustyLoader, '
'Warlock Ransomware)',
'Use of Legitimate Tools (Sliver, Certutil, GoGo Scanner)',
'Credential Theft',
'Persistent Backdoor Establishment'],
'data_breach': {'data_exfiltration': True,
'personally_identifiable_information': 'Potential (via '
'credential theft)',
'sensitivity_of_data': 'High (government, telecom, '
'university, and financial sector '
'targets)',
'type_of_data_compromised': ['Credentials',
'Potentially Sensitive '
'Government/Business Data',
'Intellectual Property '
'(Espionage Focus)']},
'date_detected': '2025-07',
'date_publicly_disclosed': '2025-07',
'description': 'Incident responders identified breaches at government '
'agencies, telecoms, and universities across multiple '
'countries, initiated via the ToolShell vulnerability '
'(CVE-2025-53770) in Microsoft SharePoint. The campaign was '
'attributed to multiple China-based threat actors, including '
'state-backed groups (Linen Typhoon, Violet Typhoon) and a '
'third group deploying Warlock ransomware. The attacks '
'involved credential theft, persistent access establishment, '
'and espionage, with some incidents also involving ransomware '
'deployment. Malware such as Zingdoor, ShadowPad, '
'KrustyLoader, and legitimate tools like Sliver and Certutil '
'were used. Over 400 governments and businesses were '
'potentially affected globally.',
'impact': {'brand_reputation_impact': 'High (government agencies, telecoms, '
'universities targeted)',
'data_compromised': True,
'identity_theft_risk': 'Potential (credential theft reported)',
'operational_impact': True,
'systems_affected': True},
'initial_access_broker': {'backdoors_established': ['Zingdoor',
'ShadowPad',
'KrustyLoader'],
'entry_point': 'Exploitation of CVE-2025-53770 '
'(ToolShell) in Microsoft SharePoint',
'high_value_targets': ['Government Agencies (U.S., '
'Africa, South America, '
'Middle East)',
'Telecom Companies (Middle '
'East)',
'Universities (U.S.)',
'Financial Institutions '
'(Europe)'],
'reconnaissance_period': 'Potentially ongoing since '
'vulnerability disclosure '
'(July 2025)'},
'investigation_status': 'Ongoing (as of 2025-07; multiple entities still '
'assessing impact)',
'lessons_learned': ['Mass scanning for vulnerabilities (e.g., ToolShell) can '
'precede targeted attacks on high-value networks.',
'Chinese state-backed actors continue to leverage both '
'espionage and ransomware (e.g., Warlock) to obfuscate '
'activities.',
'Use of legitimate tools (e.g., Sliver, Certutil) '
'complicates detection and attribution.',
'Persistent access and credential theft remain primary '
'objectives for state-sponsored groups.',
'Collaboration between private cybersecurity firms '
'(Symantec, Carbon Black, ESET) and government agencies '
'(CISA) is critical for mitigating large-scale '
'campaigns.'],
'motivation': ['Espionage',
'Intellectual Property Theft',
'Credential Theft',
'Persistent Network Access',
'Financial Gain (Ransomware)',
'Covert Data Exfiltration'],
'post_incident_analysis': {'corrective_actions': ['Mandatory Patching for '
'SharePoint Servers',
'Deployment of '
'Behavioral-Based Detection '
'for Malware (Zingdoor, '
'ShadowPad)',
'Enhanced Logging for '
'Credential Theft '
'Indicators',
'Isolation of High-Value '
'Networks (e.g., '
'Government, Telecom)',
'Threat Hunting for '
'Persistent Backdoors'],
'root_causes': ['Unpatched Vulnerability '
'(CVE-2025-53770) in On-Premises '
'SharePoint',
'Lack of Network Segmentation '
'Allowing Lateral Movement',
'Insufficient Monitoring for Mass '
'Scanning Activities',
'Use of Legitimate Tools (e.g., '
'Sliver) to Evade Detection']},
'ransomware': {'data_encryption': True,
'data_exfiltration': True,
'ransomware_strain': 'Warlock'},
'recommendations': ['Immediate patching of CVE-2025-53770 for all on-premises '
'SharePoint instances.',
'Enhanced monitoring for indicators of compromise (IoCs) '
'linked to Zingdoor, ShadowPad, KrustyLoader, and Warlock '
'ransomware.',
'Network segmentation to limit lateral movement by threat '
'actors.',
'Multi-factor authentication (MFA) enforcement to '
'mitigate credential theft risks.',
'Regular audits of high-value targets (government, '
'telecom, financial sectors) for signs of persistent '
'access.',
'Public-private threat intelligence sharing to track '
'evolving tactics of Chinese state-backed groups.',
'Training for incident responders on detecting dual-use '
'tools (e.g., Sliver) in intrusion campaigns.'],
'references': [{'date_accessed': '2025-07',
'source': 'Symantec and Carbon Black Threat Hunter Team '
'Report'},
{'date_accessed': '2025-07',
'source': 'Microsoft Security Advisory (CVE-2025-53770)'},
{'date_accessed': '2025-07',
'source': 'Reuters: Eye Security Interview on ToolShell '
'Exploitation'},
{'date_accessed': '2025-07',
'source': 'Bloomberg: Global Impact of ToolShell '
'Vulnerability'},
{'date_accessed': '2025-07',
'source': 'Recorded Future News: CISA Statement on '
'Federal/State Impact'},
{'date_accessed': '2025-07',
'source': 'ESET Research: Chinese Groups Exploiting '
'ToolShell'},
{'date_accessed': '2025-04',
'source': 'Google Threat Analysis Group: KrustyLoader and '
'Ivanti Exploits'}],
'regulatory_compliance': {'regulatory_notifications': ['CISA Alerts (U.S. '
'Federal and State '
'Entities)']},
'response': {'communication_strategy': ['Public Disclosure by Microsoft (July '
'2025)',
'Media Reports (Reuters, Bloomberg, '
'Recorded Future News)',
'CISA Advisories'],
'incident_response_plan_activated': True,
'remediation_measures': ['Microsoft Patch for CVE-2025-53770 '
'(July 2025)',
'Network Segmentation (assumed)',
'Enhanced Monitoring (assumed)'],
'third_party_assistance': ['Symantec Threat Hunter Team',
'Carbon Black Threat Hunter Team',
'Google Incident Responders',
'Eye Security',
'ESET Researchers',
'CISA (Cybersecurity and '
'Infrastructure Security Agency)']},
'stakeholder_advisories': ['CISA Alerts to U.S. Federal and State Agencies',
'Microsoft Customer Guidance for SharePoint '
'Patching',
'Symantec/Carbon Black Private Briefings to '
'Affected Organizations'],
'threat_actor': [{'motivation': 'Espionage, Intellectual Property Theft',
'name': 'Linen Typhoon',
'type': 'State-Backed (China)',
'years_active': '10+ years'},
{'motivation': 'Espionage, Intellectual Property Theft',
'name': 'Violet Typhoon',
'type': 'State-Backed (China)',
'years_active': '10+ years'},
{'motivation': ['Espionage',
'Financial Gain (Ransomware)',
'Obfuscation of Espionage Activities'],
'name': 'Unnamed Chinese Group (Warlock Ransomware)',
'type': 'Suspected State-Affiliated or Contractor',
'years_active': 'Since at least 2019 (potential links to '
'attacks dating back to 2019-2022)'},
{'name': 'Famous Sparrow', 'type': 'China-Based'},
{'name': 'Earth Estries', 'type': 'China-Based'}],
'title': 'Global Exploitation of ToolShell Vulnerability (CVE-2025-53770) and '
'Warlock Ransomware Campaign',
'type': ['Cyber Espionage',
'Data Breach',
'Ransomware Attack',
'Unauthorized Access',
'Vulnerability Exploitation'],
'vulnerability_exploited': [{'cve_id': 'CVE-2025-53770',
'description': 'ToolShell vulnerability in '
'Microsoft SharePoint '
'(on-premises)',
'patch_status': 'Patch available (announced July '
'2025)',
'severity': 'Critical'},
{'cve_id': 'CVE-2025-49706',
'description': 'Vulnerability linked to Warlock '
'ransomware deployment'}]}