CISOPlatform Breach Intelligence July 21, 2025 – Microsoft SharePoint Zero-Day, CrushFTP Critical Flaw, State Farm Credential Stuffing
Executive Summary
The cybersecurity threat landscape on July 20, 2025 revealed three significant security incidents across critical infrastructure and enterprise environments. The most critical development was the active exploitation of a Microsoft SharePoint Server zero-day vulnerability (CVE-2025-53770) affecting dozens of organizations globally, including government agencies and multinational corporations. Simultaneously, threat actors exploited a critical CrushFTP vulnerability (CVE-2025-54309) targeting file transfer servers in healthcare and government sectors. Additionally, State Farm Insurance experienced ongoing credential stuffing attacks compromising user accounts. These incidents demonstrate sophisticated attack vectors, persistent threat actor activities, and the urgent need for immediate defensive measures while maintaining strategic security posture alignment with current threat intelligence indicators.
Key Breach Incidents Overview
- Critical Microsoft SharePoint Zero-Day (CVE-2025-53770) Actively Exploited - TheHackerNews, SecurityWeek, CSO Online, CISA
 - CrushFTP Critical Vulnerability (CVE-2025-54309) Under Active Attack - TheHackerNews
 - State Farm Insurance Credential Stuffing Campaign - Cybersecurity Insiders
 - CISA Emergency Directive for Federal Agencies - CISA Alerts & Advisories
 - Multiple Zero-Day Variants Discovered (CVE-2025-53771) - National Vulnerability Database
 - Enterprise File Transfer Infrastructure Compromised - Multiple Sources
 - Government and Healthcare Sectors Targeted - Multiple Sources
 - Advanced Persistent Threat Activity Detected - Multiple Sources
 
Major Incident Analysis
Critical Microsoft SharePoint Zero-Day (CVE-2025-53770) Actively Exploited
Source: TheHackerNews, SecurityWeek, CSO Online, CISA

- July 18, 2025 (~6:00 PM CET): Initial exploitation detected by Eye Security
 - July 19, 2025 (~7:30 AM CET): Second wave of attacks observed
 - July 20, 2025: CISA adds CVE-2025-53770 to Known Exploited Vulnerabilities Catalog
 - July 21, 2025: Microsoft releases emergency patch and assigns CVE-2025-53771
 
107.191.58[.]76- Exploitation IP address104.238.159[.]149- Exploitation IP address96.9.125[.]147- Exploitation IP address- HTTP POST requests to 
/_layouts/15/ToolPane.aspx?DisplayMode=Edit - Web shell deployment: 
spinstall0.aspx - Modified 
MainUsers/default/user.xmlfiles 
- CVE-2025-53770: Unauthenticated deserialization flaw in SharePoint Server ToolShell component (CVSS 9.8)
 - CVE-2025-53771: Path traversal in Microsoft Office SharePoint allowing authorized attacker spoofing
 - CVE-2025-49704: Related SharePoint vulnerability partially patched in July update
 - CVE-2025-49706: Original ToolShell vulnerability variant
 
- T1190 (Initial Access): Exploit Public-Facing Application
 - T1505.003 (Persistence): Web Shell deployment
 - T1552.001 (Credential Access): Credentials in Files (ASP.NET MachineKey theft)
 - T1078 (Defense Evasion): Valid Accounts via forged authentication tokens
 - T1083 (Discovery): File and Directory Discovery
 - T1041 (Exfiltration): Exfiltration Over C2 Channel
 
Analysis: This represents one of the most significant zero-day exploitation campaigns of 2025, with over 85 SharePoint servers across 29 organizations compromised. The attack demonstrates sophisticated understanding of SharePoint's internal architecture, particularly the ASP.NET MachineKey validation system. Threat actors successfully chained multiple vulnerabilities to achieve persistent, unauthenticated access, enabling them to steal cryptographic secrets, deploy web shells, and move laterally within victim networks.
CrushFTP Critical Vulnerability (CVE-2025-54309) Under Active Attack
Source: TheHackerNews

- CVE-2025-54309: AS2 validation mishandling in CrushFTP allowing unauthenticated admin access (CVSS 9.0)
 
Analysis: The CrushFTP vulnerability represents a critical supply chain risk affecting government, healthcare, and enterprise file transfer operations. The attack pattern demonstrates sophisticated threat actor capabilities in reverse engineering vendor patches to identify exploitable variants.
Strategic Threat Intelligence Analysis
Current threat intelligence indicates a convergence of advanced persistent threat (APT) activities with opportunistic vulnerability exploitation targeting critical infrastructure. The simultaneous exploitation of SharePoint and CrushFTP vulnerabilities demonstrates coordinated threat actor capabilities in identifying and weaponizing zero-day vulnerabilities across enterprise collaboration and file transfer platforms. Organizations should enhance monitoring for lateral movement indicators, implement advanced behavioral analytics to detect novel attack methodologies, and prioritize zero-day detection capabilities across internet-facing applications.
CISO Strategic Recommendations
- Emergency Patch Management: Implement immediate patching for CVE-2025-53770 and CVE-2025-54309 within 24-hour emergency SLA framework
 - Enhanced Threat Hunting: Deploy advanced behavioral analytics and IOC monitoring for SharePoint and file transfer infrastructure
 - Incident Response Activation: Execute comprehensive threat hunting protocols for similar attack vector identification across all internet-facing applications
 - Supply Chain Security Assessment: Conduct immediate third-party risk assessment for file transfer and collaboration platform vendors
 - Executive Security Briefing: Schedule emergency board-level security posture review with current threat landscape assessment
 
Threat Landscape Analysis
The current threat landscape demonstrates unprecedented sophistication in multi-vector attack campaigns targeting critical enterprise infrastructure. Threat actors are leveraging advanced reverse engineering capabilities to identify and exploit zero-day variants in widely deployed enterprise applications. Organizations must adopt zero-trust architecture principles, implement continuous security validation, and enhance supply chain security assessments to maintain defensive effectiveness against evolving threat methodologies.
Conclusion and Forward-Looking Insights
The cybersecurity incidents analyzed on July 20, 2025 demonstrate the critical importance of proactive threat intelligence integration with operational security controls. The simultaneous exploitation of multiple zero-day vulnerabilities across different vendor platforms indicates coordinated threat actor capabilities requiring immediate defensive response and strategic security architecture enhancement. Future threat evolution will likely focus on AI-enhanced vulnerability research, supply chain exploitation, and coordinated multi-platform attack campaigns, requiring adaptive defensive strategies and enhanced vendor security requirements.
Sources and References
- TheHackerNews - Critical SharePoint Zero-Day
 - TheHackerNews - CrushFTP Vulnerability
 - SecurityWeek - SharePoint Under Attack
 - CISA Alert - SharePoint Vulnerability
 - CSO Online - SharePoint Zero-Day Breach
 - Cybersecurity Insiders - State Farm Attack
 - Krebs on Security - SharePoint Fix
 - National Vulnerability Database
 
For more breach intelligence reports and cybersecurity insights, visit CISOPlatform.com and sign up to be a member.
Nominate for Global CISO 100 Awards & Future CISO Awards (1-2 October Atlanta, USA): Nominate Your Peer

Comments