Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Chinese Groups Target SharePoint Servers in Global Zero-Day Attacks
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Chinese Groups Target SharePoint Servers in Global Zero-Day Attacks

Highlights

  • China-linked groups exploited recent SharePoint zero-days for widespread unauthorized access.

  • Emergency patches were issued as authorities responded to the expanding threat.

  • Ongoing attacks highlight the necessity of swift and coordinated cybersecurity efforts.

Kaan Demirel
Last updated: 22 July, 2025 - 7:10 pm 7:10 pm
Kaan Demirel 6 hours ago
Share
SHARE

Widespread cyberattacks targeting Microsoft SharePoint servers have disrupted hundreds of organizations across the globe in recent days, raising concerns among cybersecurity experts. Coordinated activity by China-affiliated threat groups has complicated incident response efforts, notably as both espionage-focused actors and opportunistic attackers have exploited previously unknown vulnerabilities. Organizations in sectors including government, finance, and health have been affected. As businesses increasingly rely on Microsoft products, the implications of such coordinated campaigns are amplified, especially where critical infrastructure is concerned.

Contents
How Are the SharePoint Zero-Days Being Exploited?Which Organizations Face the Highest Risk?Can the Spread of These Attacks Be Contained?

Earlier incidents involving SharePoint exploited similar vulnerabilities, but the latest wave reflects more sophisticated targeting and larger impact. Previous campaigns were often limited to narrower sectors or used less aggressive exploitation methods. On this occasion, a broader array of threat actors, including nation-state groups and unaffiliated attackers, have rapidly integrated the new vulnerabilities into their tactics, enabling widespread unauthorized access.

How Are the SharePoint Zero-Days Being Exploited?

Microsoft analysts have identified that the groups Linen Typhoon and Violet Typhoon, both believed to be linked to Chinese state interests, along with another actor dubbed Storm-2603, are leveraging zero-day vulnerabilities CVE-2025-53770 and CVE-2025-53771 in on-premises SharePoint deployments. The vulnerabilities, which are variations of flaws previously addressed earlier in July, allow attackers to bypass security measures and infiltrate organizational networks. Researchers note that exploitation began soon after the flaws’ discovery, spreading quickly across sectors.

Which Organizations Face the Highest Risk?

Entities spanning the public and private sectors face heightened threats, with researchers documenting incidents involving government agencies, defense contractors, academia, and several critical infrastructure providers. Microsoft underscored that unpatched systems are particularly at risk, warning that,

“with the rapid adoption of these exploits, threat actors will continue to integrate them into their attacks against unpatched on-premises SharePoint systems.”

In addition to initial compromises, attackers have sought to steal cryptographic MachineKeys, potentially maintaining access even after updates are applied.

Can the Spread of These Attacks Be Contained?

Microsoft responded to the discovery by deploying emergency patches for all supported SharePoint versions. Authorities such as the Cybersecurity and Infrastructure Security Agency reacted quickly, issuing public alerts and adding the vulnerabilities to their known exploited catalog. Security teams are prioritizing patching and incident response to contain ongoing breaches. As observed in other ransomware and espionage-focused campaigns, mitigation is complicated by the involvement of multiple actor groups and the speed at which exploits are adapted.

Investigation of each group’s methods reveals targeted objectives: Linen Typhoon, known since 2012, has emphasized data theft from strategic and governmental targets, whereas Violet Typhoon has focused on gathering information from political, academic, and health sectors, especially in the United States, Europe, and East Asia. Storm-2603, tracked as a developmental actor, pursues cryptographic keys to remain inside victim networks even after patches. All groups scan for exposed web infrastructure and exploit security gaps to deploy persistent footholds, increasing the challenge for defenders.

The recent surge in attacks against Microsoft SharePoint highlights persistent gaps in critical software defense, especially in widely deployed on-premises solutions. Staying current with security patches significantly reduces exposure to cyber threats, yet delayed patch cycles and insufficient monitoring can leave organizations vulnerable even post-disclosure. Attackers’ motivations range from espionage and intellectual property theft to broader opportunistic gain. Through rapid patch deployment, consistent monitoring, and robust response planning, organizations can minimize risk, though continued vigilance is essential as threat actors adapt to new defenses. Decision-makers should prioritize inventorying exposed systems, routinely test emergency response procedures, and remain alert for signs of lateral movement or credential misuse.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Arizona Officials Criticize CISA After Election Portal Hack Exposes Security Concerns

Hackers Target Microsoft SharePoint Servers in Ongoing Global Attacks

Cyberattack Hits United Natural Foods, Causes $400 Million Sales Loss

US Prosecutes Ryuk Ransomware Suspect after High-Profile Extradition

UNC6148 Targets Patched SonicWall SMA 100 Devices in Ongoing Attacks

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Tesla Faces Tough Investor Questions Ahead of Q2 Earnings Report
Next Article Tesla Faces Investor Questions as Musk Returns to Lead Ahead of Earnings

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Investors Fund Glid Technologies to Deploy Road-to-Rail Autonomous Vehicles
Robotics
Experts Warn Contract Lapse Leaves Infrastructure Data Unchecked
Technology
SS Innovations Performs 4,000-Mile Robotic Heart Surgery
Robotics
Tesla Expands Robotaxi Service and Sways Wall Street Analysts
Electric Vehicle
Google Targets Cost-Effective AI With Gemini 2.5 Flash-Lite Release
AI
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?