- The Packet Pulse
- Posts
- The SharePoint Highway to Your Domain
The SharePoint Highway to Your Domain
85+ servers across 29+ organizations just got hit. Here’s how.

Since July 18th, attackers have been systematically exploiting a SharePoint zero-day to breach organizations worldwide. They're not stopping at SharePoint, they're using it as a highway to everything else.
CVE-2025-53770 isn't just another patch. It's a masterclass in lateral movement.
SharePoint servers compromised. Domain controllers taken over. Entire networks dominated. All because one collaboration platform had too much trust.
Who's getting hit? Any organization running on-premises SharePoint with flat network architecture. If SharePoint can freely communicate across your data center, you're in this group.

What's Actually Happening
Exploitation without authentication -- Attackers gain remote code execution on SharePoint servers without needing credentials
Cryptographic key theft -- Malicious files steal SharePoint's machine keys, including ValidationKey and DecryptionKey
Lateral movement highways -- Stolen keys create valid payloads for accessing connected systems
Domain-level compromise -- SharePoint's integration with Outlook, Teams, and OneDrive provides pathways to domain controllers
Why Breaches Spread So Fast
SharePoint isn't designed as a fortress. It's designed for collaboration, which means integration, which means trust relationships everywhere.
Organizations discover their SharePoint servers have domain admin privileges. Collaboration platforms connect to financial systems. Document servers share network segments with critical infrastructure.
Each integration becomes an attack pathway when proper segmentation doesn't exist.
The Real Cost of Flat Networks
When attackers hit an unsegmented network, they spread laterally until someone notices. A compromised SharePoint server accesses domain controllers. A breached collaboration platform reaches customer databases. An infected document server talks to operational technology.
The blast radius isn't theoretical anymore, it's measurable in complete domain takeover within hours.
How to Actually Stop This
Patch immediately -- Enable AMSI integration and deploy Microsoft Defender on SharePoint servers
Isolate if you can't patch -- Disconnect internet-facing SharePoint until updates are available
Monitor for exploitation -- Watch for POST requests to /_layouts/15/ToolPane.aspx?DisplayMode=Edit (especially if those requests come from external IPs or unauthenticated sources)
Start network segmentation -- Create barriers between SharePoint and critical systems
Segment by function -- Group systems by business purpose, not network convenience
The Bottom Line
SharePoint Online (cloud) wasn't affected by this zero-day. Cloud providers implement segmentation by default. On-premises environments rely on you making deliberate architectural decisions.
Organizations getting breached this week aren't those with the worst IT teams, they're the ones that assumed internal networks were trusted spaces.
The zero-day will get patched. The next vulnerability is already being discovered. The question is whether attackers will find highways or roadblocks when they get inside.
Stay connected,
The Packet Pulse Team
Quick Poll
What's blocking your segmentation project? |