Overview
- Microsoft has issued updates to fix the ToolShell zero-day, recommending rotation of machine keys and isolation or shutdown of affected on-premise servers.
- CISA and the FBI have issued urgent advisories and are coordinating a joint incident response to guide organizations through mitigation steps.
- Security firms report about 100 organizations were compromised before patches were available, with attackers stealing data, passwords and machine keys for persistent access.
- The ToolShell exploit chain enables both remote code execution and spoofing and carries a 9.8 severity rating on the CVSS scale.
- Early forensic analysis indicates at least one threat actor linked to China participated in the initial attack wave, though full attribution efforts continue.