Time is of the essence. We recommend taking immediate action across several fronts.
-
Apply the emergency patch
Microsoft released an emergency patch on 21st July. If you haven’t already applied it, this should be your first priority. Apply all available security updates for on-premises SharePoint servers immediately, then verify the patches have been properly installed using external vulnerability scanners. Continue monitoring Microsoft advisories for any additional releases that may address related vulnerabilities.
-
Enable AMSI protection
The Antimalware Scan Interface (AMSI) is a component of Microsoft Defender that can detect this attack during the exploit process. We strongly recommend enabling it if you haven’t already. AMSI gives you an additional layer of protection by allowing security products to scan scripts and other content before execution. This provides crucial real-time protection against exploitation attempts.
-
Rotate your machine keys
This is really important—patching alone isn’t enough if your keys have been compromised. We suggest rotating all machine key material on potentially exposed SharePoint servers and restarting all related processes to ensure new keys are active. This step is essential to revoke any persistent access attackers may have gained through the stolen keys.
-
Enhance your monitoring and response
Increase the monitoring of your network for unusual activity, particularly from IIS worker processes. Make sure your incident response plan is up-to-date and ready to activate.
You might also want to consider engaging cybersecurity experts for a thorough compromise assessment, and keep your teams trained and vigilant against phishing and social engineering attempts, which often serve as initial entry points for broader attacks.