Chinese hackers exploit a critical flaw in Microsoft’s SharePoint software that lets attackers infiltrate servers used by businesses and governments worldwide. Microsoft warns of ongoing attacks from multiple China-based hacking groups targeting confidential data. This situation underscores the urgent need for robust cybersecurity measures.
What’s Happening & Why This Matters
Microsoft detects at least three Chinese hacking groups exploiting a zero-day vulnerability in SharePoint software. Two of these groups, known as Linen Typhoon and Violet Typhoon, operate as Chinese nation-state actors. Their focus is on espionage and the theft of intellectual property. Another group, Storm-2603, also abuses this vulnerability. Microsoft continues investigating additional threat actors using the same exploit.
The SharePoint flaw allows hackers to execute unauthorized code on vulnerable servers. This access enables them to install backdoors and remotely hijack systems. The vulnerability targets internal SharePoint servers, which often hold sensitive corporate files and link to Outlook email inboxes. This access creates a gateway for stealing data and disrupting operations.

Despite Microsoft issuing patches, attackers had exploited the flaw as early as July 7, over a week before public disclosure. Cybersecurity firms, such as Check Point, report dozens of attempted breaches across various sectors, including government, telecommunications, and software, in North America and Western Europe. Researchers identify over 9,000 vulnerable IP addresses connected to SharePoint globally.
Microsoft initially released patches for SharePoint Subscription Edition and SharePoint 2019. Later, a patch for SharePoint 2016 was also issued. Importantly, SharePoint Online on Microsoft 365 remains unaffected. Microsoft provides detailed indicators of compromise to help organizations detect and mitigate breaches.

The vulnerability stems from two software bugs discovered in May, initially as a proof of concept. Although patched by Microsoft earlier this month, hackers created bypasses to exploit the system. The US Cybersecurity and Infrastructure Security Agency (CISA) confirms these bypasses enable ongoing attacks.
Reactions and Expert Insights
Cybersecurity experts stress the importance of immediate patching and monitoring. “Organizations must act fast to update SharePoint servers to prevent infiltration,” advises a senior analyst at a leading cybersecurity firm. Microsoft’s advisory emphasizes vigilance and recommends scanning systems for indicators of compromise.
Government agencies and the private sector face increasing cyber threats from state-sponsored actors. The SharePoint flaw is a critical vector for espionage and data theft. Experts warn that such vulnerabilities risk exposing sensitive information and undermining trust in enterprise systems.
TF Summary: What’s Next
Organizations must prioritize patching SharePoint vulnerabilities to block ongoing exploits. Microsoft’s updates and detection tools play a vital role in containment. Continued vigilance against Chinese state-backed hacking groups remains essential for security teams worldwide. TF expects more advisory updates as investigations into other threat actors progress.
— Text-to-Speech (TTS) provided by gspeech