{"id":2330,"date":"2026-01-29T17:01:15","date_gmt":"2026-01-29T16:01:15","guid":{"rendered":"https:\/\/showcase-preprod.neverhack.dev\/b\/?p=2330"},"modified":"2026-02-13T10:39:13","modified_gmt":"2026-02-13T09:39:13","slug":"ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint","status":"publish","type":"post","link":"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/","title":{"rendered":"Ransomware warlock: a global cyber threat exploiting SharePoint"},"content":{"rendered":"\n<p><br>Discovered in June 2025, <strong>Warlock<\/strong> is a particularly aggressive ransomware operation based on <strong>double extortion<\/strong>: victims\u2019 data is first exfiltrated and then encrypted, with the threat of publication on the Dark Web.<br>The group operates its own leak site, known as a <strong>Leaked Data Show (DLS)<\/strong>, where data from organizations that refuse to pay is publicly exposed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">An entry point: sharePoint vulnerabilities<\/h2>\n\n\n\n<p>Initial access relies on the <strong>ToolShell vulnerability chain<\/strong> affecting Microsoft SharePoint on-premise.<br>Attackers deploy a webshell, most commonly <strong>spinstall0.asp<\/strong>, via targeted HTTP POST requests.<br>Once the infrastructure is compromised, they copy their tools into and create a <strong>Group Policy Object (GPO)<\/strong> to ensure persistence.<br>Microsoft has linked these operations to several <strong>China-based threat groups<\/strong>, notably <strong>Storm-2603<\/strong>, previously observed using LockBit, as well as <strong>Linen Typhoon (APT27)<\/strong> and <strong>Violet Typhoon (APT31)<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The warlock attack chain<\/h2>\n\n\n\n<p>After intrusion, the malicious script enables the Windows <strong>Guest<\/strong> account, changes its password, and grants it <strong>administrator privileges<\/strong>.<br><br>The attackers then conduct a reconnaissance phase, inventorying the network, domain controllers, installed applications, and available file shares.<br><br>Next comes <strong>defense neutralization<\/strong>: tools such as <strong>vmtools.exe<\/strong> (Trojan.Win64.KILLLAV.I) are downloaded, the <strong>googleApiUtil64.sys<\/strong> driver is installed to remove security solutions, and firewall rules are modified.<br><br>For data exfiltration, Warlock uses <strong>RClone<\/strong>, often renamed (e.g., <em>TrendSecurity.exe<\/em>), to transfer data to anonymous storage services such as <strong>Proton Drive<\/strong>.<br><br>Persistence is reinforced through GPOs, scheduled tasks, and the installation of <strong>Cloudflare.exe<\/strong>, which establishes an encrypted tunnel to command-and-control servers.<br>Credentials are stolen using <strong>Mimikatz<\/strong>, followed by lateral movement with <strong>PsExec<\/strong> or <strong>Impacket<\/strong>. Registry keys are also modified to disable <strong>Network Level Authentication (NLA)<\/strong>, further weakening security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Encryption and extortion<\/h2>\n\n\n\n<p>The ransomware payload, derived from the <strong>LockBit 3.0 builder<\/strong>, is then deployed across the entire network. Files are encrypted and given the extensions <strong>.x2anylock<\/strong> or <strong>.xlockxlock<\/strong>, along with a ransom note titled <em>How to decrypt my data.txt<\/em>.<br><br>The note contains a <strong>.onion link<\/strong> and a <strong>Tox ID<\/strong> to initiate ransom negotiations.<br>Even <strong>fully patched SharePoint environments<\/strong> have been compromised via a <strong>Veeam Backup vulnerability (CVE-2023-27532)<\/strong>, demonstrating the group\u2019s adaptability.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">High-profile victims<\/h2>\n\n\n\n<p>Warlock already claims dozens of victim organizations across the <strong>telecommunications, finance, industrial, and public sectors<\/strong>.<br><br>Attacks against <strong>Colt Technology Services<\/strong> and especially <strong>Orange<\/strong> received widespread media coverage, with sample datasets publicly advertised for sale. This marks the <strong>fourth <a href=\"https:\/\/neverhack.com\/en\/offers\/incident-response\">cyberattack <\/a>suffered by Orange in 2025<\/strong>.<br><br>Overall, <strong>more than 400 organizations<\/strong> are believed to have been compromised via ToolShell, and the list of victims continues to grow.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity recommendations<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Experts recommend the following measures:<\/li>\n\n\n\n<li>Immediate and prioritized <strong>patching of SharePoint<\/strong><\/li>\n\n\n\n<li><strong>PowerShell hardening<\/strong> and close monitoring of <strong>GPO changes<\/strong><\/li>\n\n\n\n<li>Blocking <strong>Cloudflared<\/strong> and <strong>RClone<\/strong><\/li>\n\n\n\n<li>Filtering outbound traffic and deploying <strong>Data Loss Prevention (DLP)<\/strong><\/li>\n\n\n\n<li>Integrating <strong>IOCs<\/strong> (IPs, domains, hashes) into <a href=\"https:\/\/neverhack.com\/fr\/offers\/soc-mssp\">SIEM and EDR solutions<\/a><\/li>\n<\/ul>\n\n\n\n<p>In case of suspected compromise: immediately isolate affected systems, collect logs, reset <strong>Active directory passwords<\/strong>, and revoke exposed authentication tokens.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discovered in June 2025, Warlock is a particularly aggressive ransomware operation based on double extortion: victims\u2019 data is first exfiltrated and then encrypted, with the threat of publication on the Dark Web.The group operates its own leak site, known as a Leaked Data Show (DLS), where data from organizations that refuse to pay is publicly &hellip; <a href=\"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/\">Continued<\/a><\/p>\n","protected":false},"author":5,"featured_media":707,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[70],"tags":[],"class_list":["post-2330","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Warlock Ransomware<\/title>\n<meta name=\"description\" content=\"An in-depth analysis of the Warlock ransomware campaign exploiting SharePoint vulnerabilities and double extortion techniques worldwide.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware warlock: a global cyber threat exploiting SharePoint\" \/>\n<meta property=\"og:description\" content=\"An in-depth analysis of the Warlock ransomware campaign exploiting SharePoint vulnerabilities and double extortion techniques worldwide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/\" \/>\n<meta property=\"og:site_name\" content=\"Neverhack\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-29T16:01:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-13T09:39:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-7.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1408\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Caroline MARIANNIE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Caroline MARIANNIE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/\",\"url\":\"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/\",\"name\":\"Warlock Ransomware\",\"isPartOf\":{\"@id\":\"https:\/\/neverhack.com\/b\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-7.webp\",\"datePublished\":\"2026-01-29T16:01:15+00:00\",\"dateModified\":\"2026-02-13T09:39:13+00:00\",\"author\":{\"@id\":\"https:\/\/neverhack.com\/b\/#\/schema\/person\/bd80a83f181aa3b592cc7bb6714299c9\"},\"description\":\"An in-depth analysis of the Warlock ransomware campaign exploiting SharePoint vulnerabilities and double extortion techniques worldwide.\",\"breadcrumb\":{\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/#primaryimage\",\"url\":\"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-7.webp\",\"contentUrl\":\"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-7.webp\",\"width\":1408,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/neverhack.com\/b\/en\/home-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware warlock: a global cyber threat exploiting SharePoint\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/neverhack.com\/b\/#website\",\"url\":\"https:\/\/neverhack.com\/b\/\",\"name\":\"Neverhack\",\"description\":\"Advanced cybersecurity solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/neverhack.com\/b\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/neverhack.com\/b\/#\/schema\/person\/bd80a83f181aa3b592cc7bb6714299c9\",\"name\":\"Caroline MARIANNIE\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Warlock Ransomware","description":"An in-depth analysis of the Warlock ransomware campaign exploiting SharePoint vulnerabilities and double extortion techniques worldwide.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Ransomware warlock: a global cyber threat exploiting SharePoint","og_description":"An in-depth analysis of the Warlock ransomware campaign exploiting SharePoint vulnerabilities and double extortion techniques worldwide.","og_url":"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/","og_site_name":"Neverhack","article_published_time":"2026-01-29T16:01:15+00:00","article_modified_time":"2026-02-13T09:39:13+00:00","og_image":[{"width":1408,"height":800,"url":"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-7.webp","type":"image\/webp"}],"author":"Caroline MARIANNIE","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Caroline MARIANNIE","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/","url":"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/","name":"Warlock Ransomware","isPartOf":{"@id":"https:\/\/neverhack.com\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/#primaryimage"},"image":{"@id":"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/#primaryimage"},"thumbnailUrl":"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-7.webp","datePublished":"2026-01-29T16:01:15+00:00","dateModified":"2026-02-13T09:39:13+00:00","author":{"@id":"https:\/\/neverhack.com\/b\/#\/schema\/person\/bd80a83f181aa3b592cc7bb6714299c9"},"description":"An in-depth analysis of the Warlock ransomware campaign exploiting SharePoint vulnerabilities and double extortion techniques worldwide.","breadcrumb":{"@id":"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/#primaryimage","url":"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-7.webp","contentUrl":"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-7.webp","width":1408,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/neverhack.com\/b\/en\/blog\/ransomware-warlock-a-global-cyber-threat-exploiting-sharepoint\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/neverhack.com\/b\/en\/home-en\/"},{"@type":"ListItem","position":2,"name":"Ransomware warlock: a global cyber threat exploiting SharePoint"}]},{"@type":"WebSite","@id":"https:\/\/neverhack.com\/b\/#website","url":"https:\/\/neverhack.com\/b\/","name":"Neverhack","description":"Advanced cybersecurity solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/neverhack.com\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/neverhack.com\/b\/#\/schema\/person\/bd80a83f181aa3b592cc7bb6714299c9","name":"Caroline MARIANNIE"}]}},"lang":"en","translations":{"en":2330},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts\/2330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/comments?post=2330"}],"version-history":[{"count":21,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts\/2330\/revisions"}],"predecessor-version":[{"id":2793,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts\/2330\/revisions\/2793"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/media\/707"}],"wp:attachment":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/media?parent=2330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/categories?post=2330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/tags?post=2330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}