Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks
Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks Source: https://thehackernews.com/2025/08/storm-2603-exploits-sharepoint-flaws-to.html
AI Analysis
Technical Summary
The threat actor group Storm-2603 has been observed deploying a DNS-controlled backdoor as part of their attack campaigns involving Warlock and LockBit ransomware families. This technique leverages DNS queries as a command and control (C2) channel, allowing the malware to receive instructions and exfiltrate data covertly, bypassing traditional network monitoring tools. The backdoor's DNS control mechanism makes detection and disruption more challenging, as DNS traffic is typically allowed and less scrutinized in enterprise environments. Storm-2603 reportedly exploits vulnerabilities in Microsoft SharePoint to gain initial access, although specific CVEs or affected versions are not detailed in the provided information. Once inside the network, the attackers deploy the DNS-controlled backdoor to maintain persistence and facilitate the deployment of ransomware payloads such as Warlock and LockBit. These ransomware variants are known for encrypting critical data and demanding ransom payments, often accompanied by data exfiltration and leak threats. The use of DNS for C2 communication indicates a sophisticated approach aimed at evading detection and maintaining stealth within targeted networks. Although no known exploits in the wild have been confirmed at this time, the high severity rating and involvement of prominent ransomware strains suggest a significant risk to organizations if exploited successfully.
Potential Impact
For European organizations, this threat poses a substantial risk to confidentiality, integrity, and availability of critical systems and data. The exploitation of SharePoint, a widely used collaboration platform in Europe, could lead to unauthorized access to sensitive corporate information and intellectual property. The DNS-controlled backdoor facilitates stealthy communication with attackers, increasing the likelihood of prolonged undetected presence within networks. This can result in extensive data exfiltration and the deployment of ransomware, causing operational disruption, financial losses, reputational damage, and potential regulatory penalties under GDPR for data breaches. The involvement of LockBit ransomware, which has a history of targeting European entities, heightens the threat level. Additionally, the use of DNS for C2 complicates detection efforts, potentially allowing attackers to bypass conventional security controls and persist longer within victim environments. The threat is particularly concerning for sectors heavily reliant on SharePoint and those with critical infrastructure or sensitive data, such as finance, healthcare, manufacturing, and government agencies across Europe.
Mitigation Recommendations
European organizations should implement targeted defenses to mitigate this threat beyond generic advice. First, conduct thorough vulnerability assessments and patch management focused on Microsoft SharePoint environments, prioritizing any known or emerging vulnerabilities even if specific CVEs are not yet public. Deploy advanced DNS monitoring and anomaly detection solutions capable of identifying unusual DNS query patterns indicative of C2 activity, such as high volumes of TXT record requests or queries to suspicious domains. Implement network segmentation to isolate critical assets and limit lateral movement opportunities for attackers. Employ endpoint detection and response (EDR) tools with behavioral analytics to detect backdoor activities and ransomware behaviors early. Enforce strict access controls and multi-factor authentication (MFA) for SharePoint and related services to reduce the risk of initial compromise. Regularly back up critical data with offline or immutable storage to enable recovery in case of ransomware encryption. Finally, conduct targeted threat hunting exercises focusing on DNS traffic and SharePoint logs to identify potential indicators of compromise proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks
Description
Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks Source: https://thehackernews.com/2025/08/storm-2603-exploits-sharepoint-flaws-to.html
AI-Powered Analysis
Technical Analysis
The threat actor group Storm-2603 has been observed deploying a DNS-controlled backdoor as part of their attack campaigns involving Warlock and LockBit ransomware families. This technique leverages DNS queries as a command and control (C2) channel, allowing the malware to receive instructions and exfiltrate data covertly, bypassing traditional network monitoring tools. The backdoor's DNS control mechanism makes detection and disruption more challenging, as DNS traffic is typically allowed and less scrutinized in enterprise environments. Storm-2603 reportedly exploits vulnerabilities in Microsoft SharePoint to gain initial access, although specific CVEs or affected versions are not detailed in the provided information. Once inside the network, the attackers deploy the DNS-controlled backdoor to maintain persistence and facilitate the deployment of ransomware payloads such as Warlock and LockBit. These ransomware variants are known for encrypting critical data and demanding ransom payments, often accompanied by data exfiltration and leak threats. The use of DNS for C2 communication indicates a sophisticated approach aimed at evading detection and maintaining stealth within targeted networks. Although no known exploits in the wild have been confirmed at this time, the high severity rating and involvement of prominent ransomware strains suggest a significant risk to organizations if exploited successfully.
Potential Impact
For European organizations, this threat poses a substantial risk to confidentiality, integrity, and availability of critical systems and data. The exploitation of SharePoint, a widely used collaboration platform in Europe, could lead to unauthorized access to sensitive corporate information and intellectual property. The DNS-controlled backdoor facilitates stealthy communication with attackers, increasing the likelihood of prolonged undetected presence within networks. This can result in extensive data exfiltration and the deployment of ransomware, causing operational disruption, financial losses, reputational damage, and potential regulatory penalties under GDPR for data breaches. The involvement of LockBit ransomware, which has a history of targeting European entities, heightens the threat level. Additionally, the use of DNS for C2 complicates detection efforts, potentially allowing attackers to bypass conventional security controls and persist longer within victim environments. The threat is particularly concerning for sectors heavily reliant on SharePoint and those with critical infrastructure or sensitive data, such as finance, healthcare, manufacturing, and government agencies across Europe.
Mitigation Recommendations
European organizations should implement targeted defenses to mitigate this threat beyond generic advice. First, conduct thorough vulnerability assessments and patch management focused on Microsoft SharePoint environments, prioritizing any known or emerging vulnerabilities even if specific CVEs are not yet public. Deploy advanced DNS monitoring and anomaly detection solutions capable of identifying unusual DNS query patterns indicative of C2 activity, such as high volumes of TXT record requests or queries to suspicious domains. Implement network segmentation to isolate critical assets and limit lateral movement opportunities for attackers. Employ endpoint detection and response (EDR) tools with behavioral analytics to detect backdoor activities and ransomware behaviors early. Enforce strict access controls and multi-factor authentication (MFA) for SharePoint and related services to reduce the risk of initial compromise. Regularly back up critical data with offline or immutable storage to enable recovery in case of ransomware encryption. Finally, conduct targeted threat hunting exercises focusing on DNS traffic and SharePoint logs to identify potential indicators of compromise proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Source Type
- Subreddit
- InfoSecNews
- Reddit Score
- 1
- Discussion Level
- minimal
- Content Source
- reddit_link_post
- Domain
- thehackernews.com
- Newsworthiness Assessment
- {"score":58.1,"reasons":["external_link","trusted_domain","newsworthy_keywords:ransomware,backdoor","established_author","very_recent"],"isNewsworthy":true,"foundNewsworthy":["ransomware","backdoor"],"foundNonNewsworthy":[]}
- Has External Source
- true
- Trusted Domain
- true
Threat ID: 688cc903ad5a09ad00c95b88
Added to database: 8/1/2025, 2:02:43 PM
Last enriched: 8/1/2025, 2:02:58 PM
Last updated: 8/1/2025, 7:03:44 PM
Views: 5
Related Threats
What the Top 20 OSS Vulnerabilities Reveal About the Real Challenges in Security Governance
HighSonicWall firewall devices hit in surge of Akira ransomware attacks
HighIt opened the free, online, practical 'Introduction to Security' class from the Czech Technical University.
LowToolShell under siege: Check Point analyzes Chinese APT Storm-2603
MediumUnmasking LockBit: A Deep Dive into DLL Sideloading and Masquerading Tactics
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.