Cyber999 Advisories

25 August 2025     Advisory

MA-1388.082025: MyCERT Advisory - Warlock Ransomware Campaign Targeting Microsoft SharePoint Servers


1.0 Introduction
Recently, The Warlock ransomware group has been actively targeting organizations by exploiting unpatched Microsoft SharePoint servers and outdated Veeam software. By leveraging these vulnerabilities, attackers gain remote code execution and establish persistence through web shells, allowing them to perform reconnaissance and prepare for further malicious activities. This campaign, observed in 2025, highlights the importance of timely patching and proper system hardening to prevent ransomware attacks.

2.0 Impact
The successful exploitation of these vulnerabilities can result in severe operational and financial damage to affected organizations. Once compromised, attackers deploy the Warlock ransomware strain to encrypt critical business files, causing significant data loss. This leads to widespread operational disruption as systems and services become unavailable, resulting in costly downtime. In addition to encryption, the attackers often exfiltrate sensitive information for double extortion, increasing the risk of data breaches and reputational harm. With elevated privileges, the threat actors can move laterally across the network, compromising additional systems and expanding their control. These attacks ultimately lead to substantial financial losses, including potential ransom payments, legal liabilities, and the cost of recovery and remediation. This campaign underscores the urgent need for timely patching and hardening of critical systems to mitigate multi-stage ransomware attacks.

3.0 Affected System

  • Unpatched Microsoft SharePoint (On-Premises)
  • Outdated Veeam Backup & Replication (CVE-2023-27532)

4.0 Technical Description

4.1 Initial Exploitation
The Warlock ransomware group exploits critical vulnerabilities to gain initial access and execute arbitrary code. Key exploited vulnerabilities include Microsoft SharePoint deserialization flaws, allowing authentication bypass and remote code execution, and CVE-2023-27532 affecting Veeam Backup & Replication software, which facilitates lateral pivoting. Attackers send crafted HTTP POST requests to upload web shells, enabling remote control and reconnaissance.

4.2 Attack Chain Overview
The attack begins with exploitation of SharePoint and Veeam vulnerabilities, followed by web shell deployment for persistence and command execution. Attackers escalate privileges by abusing Group Policy Objects (GPOs) to create new GPOs, activate the guest account, and add it to the Administrators group. They use native Windows tools (e.g., cmd.exe, nltest, ipconfig, tasklist) for discovery.

  • Credential Access
    The group employs Mimikatz for extracting plaintext passwords and dumps registry hives (SAM, SECURITY) using CrackMapExec. These credentials enable further compromise and lateral movement.
  • Lateral Movement
    Warlock spreads across the network by propagating via SMB shares using binaries disguised as vmtools.exe. They also disable security tools through a malicious driver (googleApiUtil64.sys), guided by instructions in log.txt.
  • Ransomware Deployment
    Once lateral movement is complete, the ransomware encrypts files with the extension .x2anylock and drops ransom notes in affected directories. Exfiltration of sensitive data occurs via Proton Drive using RClone, masquerading as TrendSecurity.exe. The attackers use DLL sideloading (e.g., MpCmdRun.exe, jcef_helper.exe) and deploy a tool (writenull.exe) to wipe disks, preventing recovery.

4.3 Ransomware Characteristics
The ransomware is a derivative of LockBit 3.0, inheriting its encryption efficiency and evasion mechanisms. It avoids encrypting whitelisted extensions, system directories, and certain system names to maintain stealth and ensure the system remains functional for the ransom demand process.

5.0 Indicator Of Compromise

Hash Type Description
7f04531f29aedf544e32bc9909015064fd29b98ad52c7a5b7c095a513880aab9 SHA256 Ransom.Win32.WARLOCK.A.note
0bbbf2a9d49152ac6ad755167ccb0f2b4f00b976 SHA1 Ransom.Win32.WARLOCK.A.note
b0744a33e3308082ebb6f8a8e917ba9b MD5 Ransom.Win32.WARLOCK.A.note
da8de7257c6897d2220cdf9d4755b15aeb38715807e3665716d2ee761c266fdb SHA256 Ransom.Win32.WARLOCK.A
cf0da7f6450f09c8958e253bd606b83aa80558f2 SHA1 Ransom.Win32.WARLOCK.A
68bd43a00ba948f435ecbdd402914298 MD5 Ransom.Win32.WARLOCK.A
983b4e6edd2b289dd1a389aed908861fd8f0bf7d8e82a916ebe6d4df8642ab54 SHA256 Ransom.Win32.WARLOCK.A
8b13118b378293b9dc891b57121113d0aea3ac8a SHA1 Ransom.Win32.WARLOCK.A
8a0b41e965e66689e78ca36d3477cb0c MD5 Ransom.Win32.WARLOCK.A
bba75dc056ef7f9c4ade39b32174c5980233fc1551c41aca9487019191764bac SHA256 Trojan.Win64.KILLAV.I
0488509b4dbc16dcb6d5f531e3c8b9a59b69e522 SHA1 Trojan.Win64.KILLAV.I
bf9f0c82c2ee89c7bc5480adc5e9494e MD5 Trojan.Win64.KILLAV.I


6.0 Recommendation
CyberSecurity Malaysia urges users and organizations to review the security release, follow the Mitigation steps and apply the necessary updates. 

  • Apply security patches immediately for Microsoft SharePoint and Veeam Backup software to prevent exploitation.
  • Restrict Group Policy Object (GPO) modifications to authorized administrators only.
  • Monitor for any unauthorized creation of new GPOs or activation of guest accounts.
  • Harden SMB shares by disabling unnecessary access and enforcing strong authentication.
  • Deploy endpoint detection and response (EDR/XDR) solutions to detect suspicious process executions, credential dumping tools, and abnormal remote access activity.
  • Monitor for known indicators of compromise (IOCs), unusual RClone activity, and renamed or suspicious binaries.
  • Maintain offline backups and regularly test recovery procedures to ensure data can be restored in case of ransomware or malicious deletion.

Kindly refer to the URL for more information :

Generally, we advise the users to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.

For further enquiries, please contact Cyber999 Incident Response Team through the following channels:

E-mail: cyber999[at]cybersecurity.my 
Phone: 1-300-88-2999 (monitored during business hours) 
Mobile: +60 19 2665850 (24x7 call incident reporting) 
Business Hours: Mon - Fri 08:30 -17.30 MYT 
Web: https://www.cybersecurity.my

7.0 References

logo
CyberSecurity Malaysia is the national cyber security specialist agency under the purview of the Ministry of Digital (KD)
 
Contact Us

  • CyberSecurity Malaysia,
    Level 7 Tower 1, Menara Cyber Axis, Jalan Impact,
    63000 Cyberjaya, Selangor Darul Ehsan, Malaysia.

  • enquiry@cybersecurity.my

  • +603 - 8800 7999

  • +603 - 8008 7000

TOP
ASK Byte
Chatbot Portal

Hi, I am ASK Byte. Please submit your questions about the portal and I will try to get answers from online knowledge stores.

Hi, Saya Admin Chatbot. Saya sedia chat dengan anda secara terus. Bagaimana saya boleh membantu anda?

Click the button below to interact with the CSM chatbot

Proceed