Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Jul 20, 2025 | Updated Jul 24, 2025

Exploit:Script/SuspSignoutReqBody.A

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Exploit:Script/SuspSignoutReqBody.A is an exploit targeting on-premises SharePoint Server vulnerabilities, specifically CVE-2025-53770 (a critical de-serialization vulnerability) and CVE-2025-49704 (remote code execution). The malware allows unauthenticated threat actors to launch arbitrary code on unpatched versions of SharePoint that take advantage of these software vulnerabilities, including the deployment of web shells, stealing sensitive credentials, and spreading ransomware.

Threat actors such as Linen Typhoon and Violet Typhoon are behind this attack.

The vulnerabilities exploited by the script are patched under KB5002768 for SharePoint subscription edition, KB5002741 for SharePoint 2019, and KB5002744 for SharePoint 2016.

For more information and guidance from Microsoft, read the following:

Refer to the Mitigation and protection guidance in the Disrupting active exploitation of on-premises SharePoint vulnerabilities blog for details.

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

Follow us