BigTech CompaniesCybersecurityNewswireSecurity

Chinese Hackers Exploit SharePoint Zero-Day, Warn Google & Microsoft

Get Hired 3x Faster with AI- Powered CVs CV Assistant single post Ad
▼ Summary

– Google and Microsoft researchers found China-backed hackers exploiting a zero-day bug (CVE-2025-53770) in Microsoft SharePoint to steal private keys and plant malware.
– The bug allows attackers to access files, data, and other systems on the same network, affecting self-hosted SharePoint servers.
– Microsoft identified three China-linked hacking groups—Linen Typhoon, Violet Typhoon, and Storm-2603—exploiting the flaw since July 7, targeting intellectual property and espionage.
– Microsoft has released patches, but security experts warn self-hosted SharePoint users may already be compromised, with dozens of organizations hacked, including government entities.
– China has historically denied involvement in cyberattacks, though its hackers were previously linked to the 2021 Microsoft Exchange breaches affecting 60,000+ servers.

Security experts from Google and Microsoft have uncovered a critical vulnerability in Microsoft SharePoint being actively exploited by Chinese state-sponsored hackers. The flaw, identified as CVE-2025-53770, enables attackers to steal sensitive encryption keys from self-hosted SharePoint servers, potentially compromising entire corporate networks.

The vulnerability allows unauthorized access to stored documents and systems connected to the same network. Once inside, hackers can deploy malware, exfiltrate confidential data, and move laterally across infrastructure. Microsoft confirmed that at least three China-linked threat groups, Linen Typhoon, Violet Typhoon, and Storm-2603, have weaponized the flaw since early July. While Linen Typhoon targets intellectual property theft, Violet Typhoon specializes in espionage-related data harvesting. Storm-2603, a lesser-known group, has previously been tied to ransomware operations.

Charles Carmakal, a senior executive at Google’s Mandiant, warned that multiple hacking collectives are capitalizing on the vulnerability, with confirmed breaches across government and enterprise sectors. The zero-day nature of the exploit left organizations exposed before Microsoft could release patches, now available for all affected SharePoint versions. However, security teams advise self-hosted SharePoint users to conduct immediate audits, assuming potential compromise.

This incident follows a pattern of Chinese cyber operations targeting Microsoft products. In 2021, Beijing-aligned hackers exploited Exchange Server vulnerabilities in the widespread Hafnium campaign, compromising tens of thousands of mailboxes. While China routinely denies involvement in cyberattacks, U.S. authorities have consistently attributed such breaches to state-backed actors.

The Chinese Embassy in Washington has not responded to requests for comment. Meanwhile, businesses reliant on SharePoint are urged to apply updates and monitor for suspicious activity. With nation-state hackers increasingly leveraging software vulnerabilities, proactive defense measures are no longer optional, they’re critical for organizational survival.

(Source: TechCrunch)

Topics

china-backed hackers 95% microsoft sharepoint vulnerability 90% cve-2025-53770 85% intellectual property theft 80% espionage 75% microsoft patches 70% self-hosted sharepoint risks 65% government entities targeted 60% historical cyberattacks by china 55% proactive defense measures 50%
Show More

The Wiz

Wiz Consults, home of the Internet is led by "the twins", Wajdi & Karim, experienced professionals who are passionate about helping businesses succeed in the digital world. With over 20 years of experience in the industry, they specialize in digital publishing and marketing, and have a proven track record of delivering results for their clients.
Close

Adblock Detected

We noticed you're using an ad blocker. To continue enjoying our content and support our work, please consider disabling your ad blocker for this site. Ads help keep our content free and accessible. Thank you for your understanding!