• Insurance Giant Allianz Life Grapples With Breach Affecting ‘Majority’ of Customers darkreadingKristina Beek
    • Chaos Ransomware Rises as BlackSuit Gang Falls darkreadingAlexander Culafi
    • Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads The Hacker [email protected] (The Hacker News)
    • Sophisticated Shuyal Stealer Targets 19 Browsers, Demonstrates Advanced Evasion darkreadingElizabeth Montalbano, Contributing Writer
    • Parasitic Sharepoint Exploits, (Mon, Jul 28th) SANS Internet Storm Center, InfoCON: green
    • The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)
      by Tech Jacks
      March 29, 2025
    • Tips and Tricks to Enhance Your Incident Response Procedures
      by Tech Jacks
      March 17, 2025
    • Building a Security Roadmap for Your Company: Strategic Precision for Modern Enterprises 
      by Tech Jacks
      March 10, 2025
    • The Power of Policy: How Creating Strong Standard Operating Procedures Expedites Security Initiatives
      by Tech Jacks
      March 6, 2025
    • Building a Future-Proof SOC: Strategies for CISOs and Infosec Leaders 
      by Tech Jacks
      March 3, 2025
    • Security Gate Keeping – Annoying – Unhelpful
      by Tech Jacks
      November 13, 2024

  • Home
  • Blog & Observations
  • Articles
    • Guest Author
      • Peter Ramadan
        • SOC IT to ME
        • The Power of Policy
        • CISO Elite
  • In The News
  • Podcast & Vlogs
    • Podcast Videos
    • Security Unfiltered Podcast Information
  • Training & Videos
    • AI
      • AI Governance
    • Cloud
      • AWS
      • Azure
      • Google Cloud
    • Networking
    • Scripting
    • Security
      • Application Security
      • Cloud Security
      • Incident Response
      • Pentesting Information
      • Risk Management
      • Security Policy
    • Servers
    • Microsoft SCCM
    • ISC2
  • Services

Parasitic Sharepoint Exploits, (Mon, Jul 28th) SANS Internet Storm Center, InfoCON: green

July 28, 2025

Last week, newly exploited SharePoint vulnerabilities took a lot of our attention. It is fair to assume that last Monday (July 21st), all exposed vulnerable SharePoint installs were exploited. Of course, there is nothing to prevent multiple exploitation of the same instance, and a lot of that certainly happened. But why exploit it yourself if you can just take advantage of backdoors left behind by prior exploits? A number of these backdoors were widely publicised. The initial backdoor “spinstall0.aspx”, was frequently observed and Microsoft listed various variations of this filename [1]. 

Last week, newly exploited SharePoint vulnerabilities took a lot of our attention. It is fair to assume that last Monday (July 21st), all exposed vulnerable SharePoint installs were exploited. Of course, there is nothing to prevent multiple exploitation of the same instance, and a lot of that certainly happened. But why exploit it yourself if you can just take advantage of backdoors left behind by prior exploits? A number of these backdoors were widely publicised. The initial backdoor “spinstall0.aspx”, was frequently observed and Microsoft listed various variations of this filename [1].

Since then, we have observed attempts to access these backdoors. The scans started a week ago, just as the exploits (and the name of the backdoors) became better known. 

graph of requests to sharepoint backdoors

The graph displays the number of requests we see in our honeypots each day for URLs like “‘/_layouts/.*.aspx”. This includes some exploit attempts, as they also match this pattern. But see a few “untargeted” exploit attempts at this point. Many of the requests originate from researchers counting the number of exploited systems.

Here is the complete list of possible URLs, including the date they were first detected by our honeypots:

Firt Seen Path
2025-07-13 /_layouts/15/teamslogon.aspx
2025-07-16 /_layouts/15/ToolPane.aspx
2025-07-19 /_layouts/15/spinstall0.aspx
2025-07-20 /_layouts/16/template/layouts/11.aspx
2025-07-20 /_layouts/16/template/layouts/asks.aspx
2025-07-20 /_layouts/16/template/layouts/owa/resources/iii.aspx
2025-07-20 /_layouts/16/template/layouts/z.aspx
2025-07-23 /_layouts/15/xxx.aspx
2025-07-23 /_layouts/16/3plx.aspx
2025-07-23 /_layouts/16/spinstall8.aspx
2025-07-23 /_layouts/16/spinstallx.aspx
2025-07-23 /_layouts/16/xxx.aspx
2025-07-23 /_layouts/65/xxx.aspx
2025-07-24 /_layouts/15/spinstallb.aspx
2025-07-24 /_layouts/15/sys1ayouts.aspx
2025-07-24 /_layouts/15/ToolPane.aspx/3c2b2a626c2a443387a56ad8c689b721.aspx
2025-07-24 /_layouts/15/toolpane.aspx/lkx?DisplayMode=Edit&lkx=/ToolPane.aspx
2025-07-24 /_layouts/15/ToolPane.aspx/Tool?DisplayMode=Edit&a=/ToolPane.aspx
2025-07-24 /_layouts/15/versions.aspx
2025-07-24 /_layouts/16/spinstallb.aspx
2025-07-24 /_layouts/16/spinstallp.aspx
2025-07-24 /_layouts/16/ToolPane.aspx?DisplayMode=Edit&a=/ToolPane.aspx
2025-07-24 /_layouts/settings.aspx
2025-07-24 /_layouts/viewlsts.aspx
2025-07-25 /_layouts/15/ghostfile384.aspx
2025-07-25 /_layouts/15/ghostfile692.aspx
2025-07-25 /_layouts/15/httpmanago.aspx
2025-07-25 /_layouts/15/ToolPane.aspx/1ad07ef185eb4beb9a263ddf8d4a058a.aspx
2025-07-25 /_layouts/15/ToolPane.aspx/?DisplayMode=Edit&a=/ToolPane.aspx
2025-07-25 /_layouts/15/ToolPane.aspx?DisplayMode=Edit&lkx=/ToolPane.aspx
2025-07-26 /_layouts/15/start.aspx/_layouts/15/start.aspx
2025-07-27 /_layouts/15/Error404.1.aspx
2025-07-27 /_layouts/15/Error404.11.aspx
2025-07-27 /_layouts/15/httpmanago.aspx/_layouts/15/httpmanago.aspx
2025-07-27 /_layouts/15/ToolPane.aspx/krgpjijzesqohx?DisplayMode=Edit&bgzrickdnpmoilrh=/ToolPane.aspx
2025-07-27 /_layouts/15/ToolPane.aspx/mdqxusjqiohhgxr?DisplayMode=Edit&qcahctzh=/ToolPane.aspx
2025-07-27 /_layouts/15/ToolPane.aspx/uzvazxjefwkvk?DisplayMode=Edit&nfhzxzghtrookegq=/ToolPane.aspx

 

[1] https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/

—
Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu
Twitter|

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. 

​Read More

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to email a link to a friend (Opens in new window) Email

Like this:

Like Loading...
Share

In The News

Tech Jacks
Derrick Jackson is a IT Security Professional with over 10 years of experience in Cybersecurity, Risk, & Compliance and over 15 Years of Experience in Enterprise Information Technology

Leave A Reply


Leave a Reply Cancel reply

You must be logged in to post a comment.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Blog

    • Security Gate Keeping - Annoying - Unhelpful
      November 13, 2024
    • 15 Years on LinkedIn: An Authentic Reflection(or a Beauty...
      October 24, 2024
    • Podcast & Cloud Security Governance
      February 24, 2021
    • The Journey Continues - Moving through 2021
      January 5, 2021
    • CISSP Journey
      February 22, 2019




  • About TechJacks
  • Privacy Policy
  • Gaming Kaiju
© Copyright Tech Jacks Solutions 2025

%d