Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Microsoft confirms China link to SharePoint hacks | Computer Weekly

By Computer Weekly by By Computer Weekly
July 22, 2025
Home Uncategorized
Share on FacebookShare on Twitter


Microsoft has revealed that Chinese state threat actors are actively targeting and exploiting a highly-dangerous new zero-day vulnerability in SharePoint Server, confirming earlier reports from Google Cloud’s Mandiant and others.

In a newly-published update, Microsoft said that two named threat actors – Linen Typhoon and Violet Typhoon – were targeting internet-facing SharePoint instances. Additionally, it said, an actor currently tracked as Storm-2603 is also working on exploits. Redmond said it is also investigating other actors using the exploits, and anticipates that they will be rapidly integrated into further downstream attacks.

“As noted in our blog this morning, Microsoft has released new comprehensive security updates for all supported versions of SharePoint Server, Subscription Edition, 2019, and 2016, that protect customers against these vulnerabilities,” a Microsoft spokesperson told Computer Weekly.

“In addition, we also have released hunting and mitigation guidance to customers via the 19 July MSRC blog as well as today’s MSTIC blog. Our guidance to customers is that they apply these updates immediately to ensure they are protected. We have now provided updates for all the known vulnerabilities.” 

The vulnerabilities in scope, CVE-2025-53770 and CVE-2025-53771, bypass previously disclosed flaws tracked as CVE-2025-49704 and CVE-2025-49706. The first and most serious of the two enables full remote code execution (RCE) and affects all supported versions of SharePoint Server.

Microsoft said that based on known tactics, techniques and procedures (TTPs) employed by Linen Typhoon, Violet Typhoon, and Storm-2603, it had been able to identify attempted exploits against CVE-2025-49704 and CVE-2025-40706 on or around 7 July 2025.

Typhoon blowing in

Microsoft’s threat actor naming taxonomy, which was updated in 2023 classes distinct threat actors by meteorological events to make it easier for customers and researchers to recognise threats and understand what they might be dealing with.

Under this system, Blizzard refers to Russian threat actors, Sandstorm to Iranian ones, Sleet to North Korea, and Typhoon to China. Tempest is used to classify financially-motivated gangs like ransomware actors, and Storm refers in this instance to ‘groups in development’.

In this case, Linen Typhoon and Violet Typhoon refer to two distinct clusters of China-nexus threat activity.

Linen Typhoon has been active since about 2012 and is generally focused on stealing intellectual property from its victims – this has long been a key objective of China’s cyber espionage tasking. Its hackers primarily target organisations liked to government, defence, strategic planning and human rights. It favours primarily ‘drive-by’ compromise and often relies on existing, unpatched exploits to infiltrate its victims.

Violet Typhoon has been active since 2015 and focuses on more pureplay espionage activity, targeting ex-government and military personnel, non-governmental organisations (NGOs), think-tanks, higher education institutions, media, financial, and healthcare organisations. Its victims tend to be concentrated in East Asia, Europe and North America. Its modus operandi is to scan for vulnerabilities in exposed web infrastructure and exploit the weaknesses it discovers to install web shells.

Meanwhile, Storm-2603 is suspected to be a Chinese threat actor as links between it and other APTs have not been firmed up just yet. Microsoft is tracking it in association with attempts to steal machine keys via the SharePoint vulnerabilities. Interestingly, Storm-20603 has been observed acting as a ransomware affiliate for, among others, LockBit, but Microsoft’s analysts say they cannot yet assess its true objectives with much confidence.

The Microsoft research team stressed that additional actors will likely use the SharePoint exploits to target unpatched, on-premise systems, emphasising the need for users to take proactive steps immediately.



Source link

By Computer Weekly

By Computer Weekly

Next Post
Stocks making the biggest moves premarket: Opendoor Technologies, General Motors, Lockheed Martin, Medpace and more

Stocks making the biggest moves premarket: Opendoor Technologies, General Motors, Lockheed Martin, Medpace and more

Recommended.

The 10 Coolest IoT Software Companies: The 2025 Internet Of Things 50

The 10 Coolest IoT Software Companies: The 2025 Internet Of Things 50

April 1, 2025
Fed Governor Miran says he did not tell Trump how he would vote on rates this week

Fed Governor Miran says he did not tell Trump how he would vote on rates this week

September 19, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio