Emerging in June 2025, Warlock gained attention after being used to exploit the ToolShell zero-day vulnerability in Microsoft SharePoint (CVE-2025-53770). Security vendors now believe that the group behind Warlock has deep roots in earlier espionage-linked activity dating as far back as 2019.
Researchers first detected Warlock after Microsoft confirmed that three China-linked groups, Budworm (APT27), Sheathminer (APT31), and Storm-2603, were exploiting the SharePoint vulnerability to deploy payloads.
Storm-2603 stood out by using the exploit to install both Warlock and LockBit ransomware variants. Analysts concluded that Warlock was developed or repurposed by Storm-2603, an actor with a history of combining cyberespionage and financially driven campaigns.
Check Point’s July research indicated the attackers used a custom command-and-control framework called ak47c2, along with advanced DLL sideloading techniques.
The loaders were embedded within legitimate binaries such as 7z.exe, which dynamically loaded a malicious 7z.dll module a common tactic among Chinese APTs to evade detection.
Further analysis from Palo Alto’s Unit 42 revealed the use of a ransomware toolkit dubbed Project AK47, which included loaders, backdoors, and an encryptor previously identified as AK47/Anylock.
Trend Micro’s investigation in August 2025 found encrypted files appended with the “.x2anylock” extension, reinforcing the theory that Warlock is a rebranded version of Anylock, itself derived from LockBit 3.0 code.
Forensic examination showed structural similarities between Warlock and older ransomware families like Black Basta, suggesting code repurposing or underground affiliate collaboration.
Additional findings link Warlock to historical espionage campaigns. Symantec and Carbon Black tracked the use of a BYOVD (Bring Your Own Vulnerable Driver) technique, which leveraged a compromised Baidu antivirus driver signed with a stolen “coolschool” certificate (Serial: 4deb2644a5ad1488f98f6a8d6bca1fab).
This same certificate appeared in malware samples as early as 2022, connected to a Chinese APT group known as CamoFei (or ChamelGang), which previously targeted governments and healthcare sectors in Asia and South America.
These overlaps suggest that Warlock’s operators may be long-standing contractors within the Chinese cyber ecosystem, now shifting to ransomware deployment as their primary profit model.
Organizations running on-premises SharePoint servers are strongly urged to patch CVE-2025-53770 immediately and monitor for DLL sideloading activity involving legitimate executables like 7zip or MSI-based installers.
The group’s hybrid approach, merging espionage-grade stealth with organized ransomware operations, highlights the growing convergence between state-sponsored and financially motivated threat actors.
Additional detection signatures and mitigations are available via the latest Symantec Protection Bulletin.
9d52af33c05ea80f9bc47404b02ace4e16203dd81aef9021924885a6bff1d3c1 – Loader (7z.dll)
15649e4d246fe6d03dc75ecb4cabe5d1f8723519ed8dd3176e1a97325e827daf – Loader (7z.dll) 24480dbe306597da1ba393b6e30d542673066f98826cc07ac4b9033137f37dbf – Curl Backdoor
f6ee01303cf1d68015eee49f7dc7f26151a04ae642a47e49c70806931ce652d3 – Vulnerable driver
edcf76600cd11ef7d6a5c319087041abc604e571239fe2dae4bca83688821a3a – LockBit 3.0
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Warlock Ransomware Actors Target SharePoint ToolShell Zero-Day in Latest Attack Campaign appeared first on Cyber Security News.
Concord police arrested a man they say was exposing himself in a private apartment complex.…
Mojang Studios has returned for a March 2026 edition of Minecraft Live, and we're here…
Crimson Desert developer Pearl Abyss has issued a message to players addressing complaints around the…
In a franchise as dense and prolific as Resident Evil, there’s bound to be a…
Having existed for three whole decades, the Resident Evil series naturally has a number of…
Between unusually candid developers and an obsessive fan community that has spent years unearthing franchise…
This website uses cookies.