Microsoft, SharePoint
Digest more
The Register on MSN20m
Blame a leak for Microsoft SharePoint attacks, researcher insistsMAPP program to blame? A week after Microsoft told the world that its July software updates didn't fully fix a couple of bugs, which allowed miscreants to take over on-premises SharePoint servers and remotely execute code,
Microsoft blamed two Chinese nation-state actors for exploiting recently discovered security flaws in SharePoint to infiltrate vulnerable organizations, like schools, state governments, and the U.S. government’s top nuclear security agency.
Active SharePoint exploits since July 7 target governments and tech firms globally, risking key theft and persistent access.
The hackers behind the initial wave of attacks exploiting a zero-day in Microsoft SharePoint servers have so far primarily targeted government organizations, according to researchers and news reports.
Security experts at Google and Microsoft have discovered that Chinese government-backed hackers are exploiting a serious flaw, known as a zero-day vulnerability, in Microsoft SharePoint, a tool used by many companies to store and share documents internally.
More information has emerged on the ToolShell SharePoint zero-day attacks, including impact, victims, and threat actors.
3d
Asianet Newsable on MSNUS Nuclear Weapons Agency Reportedly Hit In Microsoft ‘Zero-Day’ Breach — DOE Says Impact Was MinimalProviding additional updates on the breach, Microsoft said in a blog post on Tuesday that two Chinese nation-state operators, Linen Typhoon and Violet Typhoon, exploited vulnerabilities in the internet-facing SharePoint servers.
3don MSN
A security patch released by Microsoft earlier this month failed to fully fix a critical flaw in the U.S. tech company's SharePoint server software that had been identified at a hacking competition in May,