China-linked hackers hit US nuclear and health agencies


This recording was made using enhanced software.

Summary

Nuclear breach

Hackers exploited flaws in Microsoft SharePoint to breach systems at the National Nuclear Security Administration. No classified data was compromised, officials confirmed.

Health department attack

The NIH disconnected eight servers after confirming a compromise and attempted intrusions. Sites for major NIH programs were affected.

Chinese groups blamed

Microsoft and security researchers linked the breach to China-backed groups including Violet Typhoon and Storm-2603. Beijing denied involvement, citing lack of evidence.


Full story

Hackers exploited flaws in Microsoft SharePoint software to compromise servers at the National Institutes of Health (NIH) and the National Nuclear Security Administration (NNSA), officials confirmed. The breach was part of a broader global campaign that targeted on-premise SharePoint systems, affecting at least 60 organizations across multiple sectors and countries.

An internal email obtained by The Washington Post reveals that attackers compromised one server at NIH and attempted to breach two others. NIH disconnected eight servers from the internet as a precaution. The affected systems hosted sites for the National Institute of Diabetes and Digestive and Kidney Diseases and the Fogarty International Center.

QR code for SAN app download

Download the SAN app today to stay up-to-date with Unbiased. Straight Facts™.

Point phone camera here

Did the attack compromise any classified information?

The Department of Energy said the breach did not compromise classified materials. A spokesperson said that the agency experienced minimal impact because it used Microsoft’s cloud infrastructure and confirmed that technicians are working to restore affected systems. The NNSA, a semi-autonomous Energy Department arm responsible for nuclear weapons security, confirmed the breach but emphasized that sensitive data remained secure.

Microsoft and cybersecurity researchers attributed the intrusions to several China-linked hacking groups, including Violet Typhoon, Linen Typhoon and Storm-2603. Microsoft reported “high confidence” that attackers would continue leveraging the exploited flaws. The Chinese Embassy denied involvement and warned against accusations lacking evidence.

How severe and widespread was the campaign?

Palo Alto Networks described the vulnerability as “high-severity” due to SharePoint’s integration with platforms like OneDrive and Outlook. Security firm Eye Security said attackers could bypass patches, steal credentials and maintain access even after systems were rebooted. The flaws have been used to breach at least 100 servers, with victims in the U.S., Europe, the Middle East and Asia.

Other compromised entities reportedly included the U.S. Education Department, Florida’s Department of Revenue and Rhode Island’s General Assembly, though not all agencies responded to requests for comment.

Microsoft issued patches in early July and is continuing to investigate the attacks. The company has implemented reforms following prior high-profile breaches and is working with U.S. agencies and cybersecurity firms to harden defenses.

Emma Stoltzfus (Video Editor) and Devin Pavlou (Digital Producer) contributed to this report.
Tags: , , ,

SAN provides
Unbiased. Straight Facts.

Don’t just take our word for it.


Certified balanced reporting

According to media bias experts at AllSides

AllSides Certified Balanced May 2025

Transparent and credible

Awarded a perfect reliability rating from NewsGuard

100/100

Welcome back to trustworthy journalism.

Find out more

SAN provides
Unbiased. Straight Facts.

Don’t just take our word for it.


Certified balanced reporting

According to media bias experts at AllSides

AllSides Certified Balanced May 2025

Transparent and credible

Awarded a perfect reliability rating from NewsGuard

100/100

Welcome back to trustworthy journalism.

Find out more

Bias comparison

  • Media outlets on the left frame the breach primarily as a serious security failure at a sensitive nuclear weapons agency, emphasizing vulnerability with terms like “breached” and criticizing officials who “insist that’s no big deal,” spotlighting concerns about government downplaying and broader systemic risks including references to past cyberattacks like SolarWinds.
  • Media outlets in the center uniquely tempers these framings by neutrally reporting no compromise of classified data and emphasizing SharePoint Online’s immunity, thus de-emphasizing alarm.
  • Media outlets on the right similarly stress the national security threat but focus sharply on Chinese culpability, using charged phrases like “China-linked hack” and “blames,” creating a narrative of ongoing Chinese cyber aggression that bolsters geopolitical anxieties.

Media landscape

Click on bars to see headlines

51 total sources

Key points from the Left

  • The U.S. National Nuclear Security Administration was breached due to a hack of Microsoft SharePoint software, according to a knowledgeable source.
  • No sensitive information was compromised in the attack, as per the anonymous individual.
  • Microsoft attributed the breach to Chinese state-sponsored hackers exploiting software vulnerabilities.
  • The Department of Energy reported minimal impact from the attacks due to strong cybersecurity measures and is currently restoring affected systems.

Report an issue with this summary

Key points from the Center

  • Unknown hackers exploited a Microsoft SharePoint zero-day vulnerability to breach the National Nuclear Security Administration and other agencies in July 2025.
  • The attacks began on July 18 and followed earlier unnoticed exploitation starting around July 7, targeting self-hosted SharePoint servers vulnerable to CVE-2025-53770.
  • Microsoft and Google identified Chinese state-sponsored groups Linen Typhoon, Violet Typhoon and Storm-2603 as the main exploiters of the vulnerability across government and corporate networks.
  • Researchers identified over 400 compromised servers and at least 148 affected organizations worldwide, while the NNSA reported that only a limited number of their systems were affected and are currently undergoing restoration.

Report an issue with this summary

Key points from the Right

  • The National Nuclear Security Administration was affected by a cyberattack targeting Microsoft's SharePoint software, confirmed by a person familiar with the matter to Bloomberg.
  • The Energy Department acknowledged a breach that began on July 18 due to a zero-day vulnerability in SharePoint and reported the impact as minimal, affecting a small number of systems.
  • Microsoft attributed the hacking campaign to Chinese state-sponsored groups, including Linen Typhoon, Violet Typhoon and Storm-2603, exploiting SharePoint vulnerabilities.
  • Officials assured that no classified data was compromised, stating that the department's use of Microsoft M365 and strong cybersecurity systems minimized the impact.

Report an issue with this summary

Other (sources without bias rating):

Powered by Ground News™

Daily Newsletter

Start your day with fact-based news

Start your day with fact-based news

Learn more about our emails. Unsubscribe anytime.

By entering your email, you agree to the Terms and Conditions and acknowledge the Privacy Policy.