Microsoft vulnerability enables global attack on government agencies, businesses


This recording was made using enhanced software.

Summary

‘Significant’ vulnerability

Microsoft’s SharePoint software is being affected by a significant vulnerability, which could expose sensitive information from governments and businesses.

Microsoft response

Microsoft has responded by issuing patches for two versions of the affected software, although one other SharePoint version remains vulnerable.

Unknown origins

Neither private cybersecurity firms or the federal government has named any suspects, though the FBI says it is investigating the matter.


Full story

Hackers are actively exploiting a severe vulnerability affecting Microsoft’s SharePoint software, putting thousands of businesses and organizations at risk across the globe. The security flaw lets attackers access sensitive files and encryption keys that could be used to regain entry even after the vulnerability is fixed.

In a press release on Saturday, July 19, the U.S. Cybersecurity and Infrastructure Security Agency said the bug affects SharePoint servers housed within an organization and not in the cloud. Such servers are commonly used for document storage and collaboration.

QR code for SAN app download

Download the SAN app today to stay up-to-date with Unbiased. Straight Facts™.

Point phone camera here

The security flaw is being referred to as a “zero-day,” a term used to describe a vulnerability that was being exploited before the software’s developers were aware of it.

‘Significant’ security vulnerability

The European cybersecurity firm Eye Security, which first revealed the flaw, warned that the vulnerability could permit even greater access into a target’s system, given that SharePoint servers often connect with other Microsoft services, such as Outlook, OneDrive and Teams.

Eye Security said it already found “dozens” of SharePoint servers being exploited. Known victims include federal and state government agencies, universities, energy companies and an Asian telecommunications company, according to The Washington Post

Adam Meyers, senior vice president with the cybersecurity firm CrowdStrike, described the vulnerability as “significant,” telling The Post that “anybody who’s got a hosted SharePoint server has got a problem.”

Security patches may not be enough

Microsoft has issued patches for two versions of SharePoint so far. One version remains vulnerable, however.

Experts warn that even with security updates, SharePoint servers could still be exploited in the future if attackers gained access to encryption keys.

“Once inside, they’re exfiltrating sensitive data, deploying persistent backdoors, and stealing cryptographic keys,” Michael Sikorski, the head of threat intelligence for Palo Alto’s Unit 42, told The Hacker News. “The attackers have leveraged this vulnerability to get into systems and are already establishing their foothold.”

Charles Carmakal, the chief technology officer at Google Cloud’s Mandiant, also warned of the bug’s severity in a statement on LinkedIn.

“This isn’t an ‘apply the patch and you’re done’ situation,” Carmakal said. “Organizations need to implement mitigations right away (and the patch when available), assume compromise, investigate whether the system was compromised prior to the patch/mitigation, and take remediation actions.” 

Aside from security patches, those using on-premises SharePoint servers are also urged to rotate their encryption keys. 

It is not yet publicly known who is actively exploiting the SharePoint flaw. The FBI has said it is “working closely with our federal government and private sector partners” on the matter.

Alan Judd (Content Editor) and Devin Pavlou (Digital Producer) contributed to this report.
Tags: , , , , , , ,

SAN provides
Unbiased. Straight Facts.

Don’t just take our word for it.


Certified balanced reporting

According to media bias experts at AllSides

AllSides Certified Balanced May 2025

Transparent and credible

Awarded a perfect reliability rating from NewsGuard

100/100

Welcome back to trustworthy journalism.

Find out more

Why this story matters

A newly discovered and actively exploited flaw in Microsoft SharePoint servers exposes organizations to data breaches and ongoing cyberattacks, even after patches, threatening businesses, governments, and critical infrastructure worldwide.

Cybersecurity vulnerability

The discovery of a "zero-day" flaw in SharePoint servers, as reported by Eye Security and confirmed by organizations like CrowdStrike and Mandiant, highlights the ongoing risk of sophisticated cyberattacks on vital business and government systems.

Continued risk and mitigation

Experts, including Michael Sikorski of Palo Alto's Unit 42 and Charles Carmakal of Google Cloud's Mandiant, warn that simply applying patches may not fully secure compromised systems, emphasizing the importance of broader mitigations and proactive investigations.

Impact on critical sectors

The vulnerability has already been exploited at federal and state agencies, universities, energy companies and telecommunications organizations, demonstrating the widespread potential impact on essential services and data security.

SAN provides
Unbiased. Straight Facts.

Don’t just take our word for it.


Certified balanced reporting

According to media bias experts at AllSides

AllSides Certified Balanced May 2025

Transparent and credible

Awarded a perfect reliability rating from NewsGuard

100/100

Welcome back to trustworthy journalism.

Find out more

Daily Newsletter

Start your day with fact-based news

Start your day with fact-based news

Learn more about our emails. Unsubscribe anytime.

By entering your email, you agree to the Terms and Conditions and acknowledge the Privacy Policy.