Cybersecurity Snapshot: CISA Analyzes Malware Used in SharePoint Attacks, as U.K. Boosts Cyber Assessment Framework

Check out what CISA found after it dissected malware from the latest SharePoint hacks. Plus, the U.K.’s cyber agency is overhauling its cyber framework to keep pace as threats escalate. In addition, Google is warning that cloud attacks are getting dangerously sophisticated. And get the latest on CISA’s new malware analysis platform and its report on a critical infrastructure org’s cyber flaws.
Here are five things you need to know for the week ending August 8.
1 - CISA unpacks malware linked to exploited SharePoint bugs
CISA has published an analysis of six malware files associated with SharePoint vulnerabilities that have been actively exploited in recent weeks.
Hackers are using the files – including web shells and a key stealer – to swipe cryptographic keys and exfiltrate data by running malicious code, CISA said in a statement this week.
“CISA encourages organizations to use the indicators of compromise (IOCs) and detection signatures in this Malware Analysis Report to identify malware samples,” reads the report titled “MAR-251132.c1.v1 Exploitation of SharePoint Vulnerabilities.”

The vulnerabilities – CVE-2025-49706, CVE-2025-49704, CVE-2025-53770 and CVE-2025-53771 – impact on-premises versions of SharePoint Server: SharePoint Server Subscription Edition, SharePoint Server 2019 and SharePoint 2016. SharePoint Online in Microsoft 365 isn’t affected.
The first attacks were reported on July 19, as hackers linked CVE-2025-49706 and CVE-2025-49704 in an exploit chain dubbed “ToolShell.” The exploitation of CVE-2025-53770, a zero-day bug Microsoft described as a variant of CVE-2025-49706, soon followed.
Although Microsoft has not confirmed it, it’s likely that CVE-2025-53771 has also been exploited, since it can be chained with CVE-2025-53770, according to CISA.
To get the details on these SharePoint vulnerabilities, check out the Tenable Research Special Operations team’s blog “CVE-2025-53770: Frequently Asked Questions About Zero-Day SharePoint Vulnerability Exploitation.”
Attackers exploiting these SharePoint vulnerabilities include, according to Microsoft, Chinese nation-state groups Linen Typhoon and Violet Typhoon, as well as China-based ransomware actor Storm-2603..
To get more information about these SharePoint vulnerabilities, check out:
- “Disrupting active exploitation of on-premises SharePoint vulnerabilities” (Microsoft)
- “Customer guidance for SharePoint vulnerability CVE-2025-53770” (Microsoft)
- “CVE-2025-53770: Frequently Asked Questions About Zero-Day SharePoint Vulnerability Exploitation” (Tenable)
- “SharePoint 0-day uncovered (CVE-2025-53770)” (Eye Security)
- ““Microsoft Releases Guidance on Exploitation of SharePoint Vulnerabilities” (CISA)
2 - NCSC updates cyber framework to tackle advanced threats
In response to the growing sophistication of attacks impacting British critical service providers, the U.K.’s cyber agency has revamped its core cybersecurity framework.
Version 4.0 of the National Cyber Security Centre’s (NCSC) Cyber Assessment Framework, published this week, features new and updated information in four key areas:
- Attacker methods and motivations
- Secure development of software used in essential services
- Cyber threat detection via security monitoring and threat hunting
- AI-related cyber risks

(Image generated by Tenable using Google Gemini)
For example, a new section about cyber risk management explains how policies, processes and procedures can help organizations better understand, assess and manage cybersecurity risks. Another new section focuses on supply chain risk in areas like software development and cloud services.
“Keeping pace with the evolution of attack methods is essential to close the widening gap between the escalated cyber threats to critical services, and our collective ability to defend against them,” the NCSC said in a statement.
“These two themes have driven our updates to the CAF to ensure the framework remains relevant, and that organisations' defences are up to date,” it added.
The Cyber Assessment Framework is designed to help organizations that provide critical services enhance their cyber resilience to prevent operational disruptions in areas such as energy, healthcare, government and transportation.
For more information about the benefits of adopting cybersecurity frameworks:
- “A Complete Guide to the NIST Risk Management Framework” (EC-Council)
- “A Comparison of Leading Security Frameworks: NIST, ISO 27001, and Zero Trust” (Quick and Dirty Tips)
- “Top 12 IT security frameworks and standards explained” (TechTarget)
- “Essential Cybersecurity Frameworks and Standards for Start-ups and Fast-Growing Tech Companies” (CTO Academy)
- “SOC2 vs NIST VS ISO: Understanding the Differences Between Cybersecurity Frameworks” (Security Scientist)
5 Cybersecurity Frameworks Every GRC Professional Needs To Know (GRC for Mere Mortals)
3 - Google: Cloud attacks are getting smarter and nastier
Hackers are sharpening their attacks on cloud environments with new advanced tactics – and inflicting disruptive damage.
That’s a key takeaway from Google’s “Cloud Threat Horizons Report H2 2025,” published this week.
“Cloud environments face an increasingly sophisticated threat landscape as actors advance their methods for data exfiltration, identity compromise and supply chain attacks, while simultaneously improving evasion and persistence techniques,” reads the report.
Cloud hackers’ new playbook includes:
- Wrecking your disaster recovery: Hitting backup systems first to cripple your safety net
- Bypassing multi-factor authentication: Stealing credentials and session cookies with slick social engineering to walk right past your defenses
- Hiding in plain sight: Planting malicious files – usually PDFs – inside legitimate cloud storage services
Still, their favorite entry points remain the good old methods of credential compromise and misconfiguration exploitation. Google’s advice? Double down on foundational cybersecurity, including solid identity and access management, and proactive vulnerability management.
H1 2025 Distribution of Initial Access Vectors Exploited by Threat Actors

(Source: Google’s “Cloud Threat Horizons Report H2 2025,” August 2025)
Specifically, the report recommends embracing a defense-in-depth strategy centered on:
- identity security
- recovery mechanisms
- vigilance against sophisticated social engineering and deception tactics
- supply chain integrity
For more information about cloud security, check out these Tenable resources:
- “Identity is the New Perimeter: Why Your IdP Isn’t Enough” (blog)
- “Tenable Cloud Security Risk Report 2025” (report)
- “Why Your Cloud Data May Not Be Secure After All: Insights from Tenable Research” (on-demand webinar)
- “Tackling Shadow AI in Cloud Workloads” (blog)
- “The Future of Cloud Access Management: How Tenable Cloud Security Redefines Just-in-Time Access” (blog)
4 - Report finds alarming cyber gaps in critical infrastructure org
Plaintext passwords. Shared admin accounts. Unrestricted remote access.
These aren’t rookie mistakes. They’re real-world cybersecurity missteps found by CISA and the U.S. Coast Guard (USCG) during a recent threat hunt at an unnamed critical infrastructure organization.
While no active breach was discovered, the gaps put the organization at an elevated risk. The audit also revealed poor network segmentation between IT and operational technology (OT) environments, as well as insufficient logging.
“Critical infrastructure organizations are advised to review and implement the mitigations listed in this advisory to prevent potential compromises and better protect our national infrastructure,” reads the document, published this week.

(Image generated by Tenable using Google Gemini)
Mitigation recommendations include:
- Never store passwords or credentials in plain text. Instead, use tools such as encrypted password vaults and managed service accounts.
- Protect credentials by encrypting them at rest and in transit, and by adopting strong access controls. Conduct regular audits of scripts and tools that access credentials.
- Don’t share local admin account credentials. Rather, create unique, complex passwords for each account.
- Secure access to admin accounts and to remote access services with multi-factor authentication.
- Conduct granular and comprehensive logging across all systems, and ensure captured logs include authentication attempts and command-line executions.
The critical infrastructure organization asked CISA and USCG to conduct the threat hunt, and it participated in the drafting of the report.
To get more details, check out the full advisory “CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization.”
For more information about protecting critical infrastructure against cyber attacks:
- “Critical Infrastructure Security and Resilience” (CISA)
- “How To Secure All of Your Assets - IT, OT and IoT - With an Exposure Management Platform” (Tenable)
- “Identity Security Is the Missing Link To Combatting Advanced OT Threats” (Tenable)
- “Cybersecurity of Critical Sectors” (EU Agency for Cybersecurity)
- “Critical Infrastructure Protection” (MITRE)
5 - CISA releases Thorium to boost malware analysis
Tired of juggling a dozen siloed malware analysis tools?
If so, you’re not alone, which is why CISA and Sandia National Laboratories have developed a new platform designed to unify and automate your malware analysis workflow.
Called Thorium and announced this week, the free platform is designed to integrate and orchestrate different malware analysis tools. Thorium also allows users to modify their toolsets.
“By publicly sharing this platform, we empower the broader cybersecurity community to orchestrate the use of advanced tools for malware and forensic analysis,” CISA Associate Director for Threat Hunting Jermaine Roebuck said in a statement.

(Credit: CISA)
Thorium is built for high performance. It can ingest 10 million files per hour and schedule 1,700 jobs per second, and it integrates with commercial, custom and open-source tools.
It's designed to give cyber defenders the speed and scale needed to combat modern threats.
“The goal of Thorium is to enable cyber defenders to bring automation to their existing analysis workflows through simple tool integration and intuitive event-driven triggers,” reads the Thorium fact sheet.
Key Thorium features include:
- the ability to integrate tools using Docker images
- filter results with tags and full-text searches
- manage access with group-based permissions
- scale operations with Kubernetes and ScyllaDB
To get more details, you can visit the Thorium GitHub page.
- AI
- Cloud
- Exposure Management
- IT/OT
- Malware & Malicious Behavior
- Cloud
- Exposure Management
- Federal
- Government
- Malware
- OT Security
- Threat hunting