Close Menu

    Stay Ahead with Exclusive Updates!

    Enter your email below and be the first to know what’s happening in the ever-evolving world of technology!

    What's Hot

    Grid-Responsive AI: How Nvidia Plans to Turn Data Centers Into Power Assets with Emerald AI

    April 16, 2026

    Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

    April 16, 2026

    The Trillion-Dollar Exit: Why a SpaceX IPO Would Reshape the Space Economy

    April 15, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter)
    PhronewsPhronews
    • Home
    • Big Tech & Startups

      The Trillion-Dollar Exit: Why a SpaceX IPO Would Reshape the Space Economy

      April 15, 2026

      The Sacramento Blueprint: How California is Writing the U.S. AI Rulebook

      April 14, 2026

      Silicon Sovereignty: Microsoft’s $10B Play to Secure Japan’s AI Future

      April 14, 2026

      The Rule-Breaker: Why DeepSeek V4 is China’s Defiant Bid for AI Supremacy

      April 13, 2026

      Scheduling Monopoly? Why Nvidia’s SchedMD Deal Alarms Open-Source Devs

      April 13, 2026
    • Crypto

      Quantum Computing Advances Force Coinbase and Institutional Custodians to Rethink Crypto Security

      March 8, 2026

      AI Assisted Hacking Groups Target Crypto Firms With Multi-Layered Social Engineering

      February 18, 2026

      Global Crypto Regulations Expand as 2026 Begins With New Data Collection Frameworks and National Laws

      January 16, 2026

      Coinbase Bets on Stablecoin and On-Chain Growth as Key Market Drivers in 2026 Strategy

      January 10, 2026

      Tether Faces Ongoing Transparency Questions and Reserve Scrutiny Amid Massive Bitcoin Accumulation

      January 5, 2026
    • Gadgets & Smart Tech
      Featured

      AirPods Max 2: USB-C, Live Translation, and the H2 Upgrade

      By preciousMarch 26, 2026
      Recent

      AirPods Max 2: USB-C, Live Translation, and the H2 Upgrade

      March 26, 2026

      How ABB and Nvidia are Perfecting Industrial Robotics using AI Simulation

      March 20, 2026

      Neura Robotics Reaches €4B Valuation With Tether Backing

      March 12, 2026
    • Cybersecurity & Online Safety

      Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

      April 16, 2026

      Your Company Could Be Iran’s Next Target: What U.S. Tech Firms Need to Do Right Now

      April 6, 2026

      Google Is Warning Us About The Encryption Protecting Your Data Today. It May Not Survive Quantum Computing

      April 5, 2026

      Accenture and Anthropic Team Up on AI-powered Cybersecurity

      April 4, 2026

      Your BVN, Passport, and Bank Account May Already Be on the Dark Web. What Every Nigerian Must Do Right Now After the Banking Breaches

      April 4, 2026
    PhronewsPhronews
    Home»Big Tech & Startups»China-linked hackers exploit SharePoint zero-day flaw to hit U.S. agencies
    Big Tech & Startups

    China-linked hackers exploit SharePoint zero-day flaw to hit U.S. agencies

    preciousBy preciousAugust 3, 2025Updated:August 4, 2025No Comments
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Photo Credit: Thomas Fuller/SOPA Images/LightRocket via Getty Images

    A wave of cyberattacks linked to Chinese state-sponsored hackers recently targeted vulnerable Microsoft SharePoint servers and affected several U.S. government agencies, Microsoft announced in a blog post.

    The cyberattacks, dated back to early July 2025, leveraged a set of zero-day vulnerabilities that were brought to fore and highlighted in the Microsoft July 2025 Patch Tuesday Update. The hackers used these zero-day vulnerabilities to gain access to sensitive systems and deploy malicious software. 

    How the cyberattacks went down

    Microsoft revealed in a detailed blog post that sophisticated hacking groups, identified as Linen Typhoon, Violet Typhoon, and Storm-2603, were behind the cyberattack campaign. These groups have always had a history of targeting organizations involved in government defense, strategic planning, and human rights, often for purposes of espionage and data theft, according to Microsoft.

    The attacks targeted on-premises SharePoint servers, as the hackers exploited several critical vulnerabilities such as:

    • CVE-2025-49704 (SharePoint RCE): A remote code execution flaw that allows attackers to run malicious software on the server
    • CVE-2025-49706 (SharePoint Post-auth RCE): An authentication bypass that enables attackers to masquerade as legitimate users
    • CVE-2025-53770 (SharePoint ToolShell Auth Bypass and RCE) & CVE-2025-53771 (SharePoint ToolShell Path Traversal): Additional flaws that allowed attackers to sidestep previously issued security fixes.

    According to Microsoft, the attack started with the hackers sending crafted POST requests to a SharePoint server known as ToolPane, and subsequently uploaded a malicious script named spinstall0.aspx. This gave the hackers remote control over the compromised servers and allowed them to hijack and retrieve the MachineKey data which, in turn, enabled “the theft of the key material by threat actors.”

    Specifically, the cybercriminal group identified as Storm-2603 was reported to leverage compromised access to deploy “Warlock” ransomware, therefore encrypting files in target environments and further escalating the crisis. 

    Incident Response and Mitigation

    After the cyberattack was noticed, Microsoft moved quickly by rolling out emergency security updates for all supported on-premises versions of SharePoint. The company, alongside the U.S. Cybersecurity and Infrastructure Security Agency (CISA), also provided guidance for organizations to contain and remediate the attacks. Some of these recommendations or guidelines include: 

    • Apply security updates immediately: All organizations using on-premises SharePoint were advised to apply Microsoft’s latest patches
    • Enable security features: Activate the Antimalware Scan Interface (AMSI) in SharePoint and ensure Defender Antivirus is running
    • Rotate MachineKeys: After patching, refresh cryptographic MachineKeys to disrupt persistent attacker access
    • Restart Internet Information Services (IIS): A full server restart is needed to ensure all new settings take effect
    • Enhance monitoring and detection: Use endpoint detection and response (EDR) tools to spot and respond to any further attacks.
    • Incident response: Organizations are urged to review logs for malicious file uploads and suspicious activity, and to follow Microsoft’s threat hunting queries for identifying compromised systems.

    Federal Agencies caught in the crosshairs

    The attack campaign affected multiple U.S. federal agencies. While officials have stated there is no evidence that classified information was stolen, the breach still disrupted operations across key entities, including parts of the Department of Homeland Security and the National Nuclear Security Administration.

    Globally, over 400 organizations were affected, including European and Middle Eastern government bodies, universities, and companies in sectors such as energy and finance. According to Microsoft, roughly 20% of observed SharePoint environments were exposed to these vulnerabilities at the height of the attack, with more than 1,100 servers identified as unpatched or at risk. 

    The SharePoint zero-day exploits show the evolving sophistication of cyber threats, especially with countries sponsoring threat actors to attack a rival. It also highlights the high stakes for organizations and national agencies managing and dealing with sensitive data. 

    As usual, regular updates, strong incident response strategies, and the use of advanced security solutions remain the best defenses against these ever-changing attacks.

    AMSI Security Chinese Hackers Chinese-linked threat actors CISA CISA Guidance Critical infrastructure CVE-2025-49704 CVE-2025-49706 CVE-2025-53770 CVE-2025-53771 cyber espionage cybersecurity Cybersecurity 2025 Cybersecurity Mitigation Cyberthreats Department of Homeland Security DHS Cyberattack Endpoint Detection Enterprise Security Espionage and Data Theft Global Cyber Threats Government Data Breach Linen Typhoon MachineKey Exploit MachineKeys Microsoft Microsoft cyberattack Microsoft Incident Response Microsoft July 2025 Patch Tuesday Update Microsoft Patch Tuesday Microsoft SharePoint Nation State Threats National Nuclear Security National Nuclear Security Administration On-premises SharePoint servers Ransomware Attacks SharePoint RCE SharePoint Zero Day State Sponsored Cyberattack Storm-2603 ToolPane U.S. Agencies U.S. Federal Cyber Breach Violet Typhoon Warlock Ransomware Zero Day Vulnerabilities Zero-Day Exploits
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    precious
    • LinkedIn

    I’m Precious Amusat, Phronews’ Content Writer. I conduct in-depth research and write on the latest developments in the tech industry, including trends in big tech, startups, cybersecurity, artificial intelligence and their global impacts. When I’m off the clock, you’ll find me cheering on women’s footy, curled up with a romance novel, or binge-watching crime thrillers.

    Related Posts

    Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

    April 16, 2026

    The Trillion-Dollar Exit: Why a SpaceX IPO Would Reshape the Space Economy

    April 15, 2026

    The Sacramento Blueprint: How California is Writing the U.S. AI Rulebook

    April 14, 2026

    Comments are closed.

    Top Posts

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025

    Anthropic Will Use Claude User Chats For Data Training

    October 16, 2025
    Don't Miss
    Uncategorized

    Grid-Responsive AI: How Nvidia Plans to Turn Data Centers Into Power Assets with Emerald AI

    By preciousApril 16, 2026

    Data centers are power-hungry by design, but Nvidia wants them to work in the opposite…

    Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

    April 16, 2026

    The Trillion-Dollar Exit: Why a SpaceX IPO Would Reshape the Space Economy

    April 15, 2026

    The Sacramento Blueprint: How California is Writing the U.S. AI Rulebook

    April 14, 2026
    Stay In Touch
    • Facebook
    • Twitter
    About Us
    About Us

    Evolving from Phronesis News, Phronews brings deep insight and smart analysis to the world of technology. Stay informed, stay ahead, and navigate tech with wisdom.
    We're accepting new partnerships right now.

    Email Us: info@phronews.com

    Facebook X (Twitter) Pinterest YouTube
    Our Picks
    Most Popular

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025
    © 2025. Phronews.
    • Home
    • About Us
    • Get In Touch
    • Privacy Policy
    • Terms and Conditions

    Type above and press Enter to search. Press Esc to cancel.