We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Exploit:Script/SuspSignoutReqBody.A
Aliases: No associated aliases
Summary
Exploit:Script/SuspSignoutReqBody.A is an exploit targeting on-premises SharePoint Server vulnerabilities, specifically CVE-2025-53770 (a critical de-serialization vulnerability) and CVE-2025-49704 (remote code execution). The malware allows unauthenticated threat actors to launch arbitrary code on unpatched versions of SharePoint that take advantage of these software vulnerabilities, including the deployment of web shells, stealing sensitive credentials, and spreading ransomware.
Threat actors such as Linen Typhoon and Violet Typhoon are behind this attack.
The vulnerabilities exploited by the script are patched under KB5002768 for SharePoint subscription edition, KB5002741 for SharePoint 2019, and KB5002744 for SharePoint 2016.
For more information and guidance from Microsoft, read the following:
Refer to the Mitigation and protection guidance in the Disrupting active exploitation of on-premises SharePoint vulnerabilities blog for details.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.