Recent reports indicate a significant cybersecurity concern as Microsoft acknowledges vulnerabilities in its on-premises SharePoint servers. These flaws have been actively exploited by Chinese “threat actors,” a designation that includes state-sponsored hacking groups. The attacks have resulted in widespread breaches affecting hundreds of government agencies, businesses, and various organizations. The majority of these compromised entities are located in the United States, raising significant national security implications.
One particularly alarming report highlighted the National Nuclear Security Administration, the US agency responsible for overseeing nuclear weapons, as one of the victims. This underscores the severity and sensitive nature of the information that could potentially be exposed. Microsoft identified three groups—Linen Typhoon, Violet Typhoon (both state-backed), and Storm-2603 (believed to be China-based)—as being responsible for utilizing these newly discovered security vulnerabilities to target internet-facing SharePoint servers.
The announcement from Microsoft coincides with broader geopolitical tensions between Washington and Beijing, especially concerning technology and artificial intelligence.
There have been reports of major tech companies like Amazon and consultancy firms like McKinsey scaling back AI-related operations in China. Similarly, Microsoft and IBM have reportedly reduced their China-based research and development projects, reflecting increased scrutiny from US officials regarding American companies’ involvement in AI in China.
Microsoft clarified that the exploited vulnerabilities are specific to on-premises SharePoint servers, which are widely used by organizations for document sharing and collaboration, rather than its cloud-based service. The attacks, which began as early as July 7, aimed to gain initial access to target organizations by exploiting flaws that allow attackers to spoof authentication credentials and execute malicious code remotely. This includes the theft of “key material” from the servers.
In response to these pervasive attacks, Microsoft has promptly released security updates designed to patch these critical vulnerabilities. The company has strongly advised all users of on-premises SharePoint systems to install these updates immediately. Furthermore, Microsoft has issued a stark warning, assessing with “high confidence” that the identified hacking groups will persist in their attempts to exploit unpatched on-premises SharePoint systems, emphasizing the urgency of applying the security fixes.
Reference: