Chinese Hackers Breach Microsoft SharePoint Servers Worldwide

Microsoft SharePoint Servers Hacked by Chinese Threat Actors

Microsoft has confirmed that several state-backed Chinese hacking groups have exploited vulnerabilities in its on-premises SharePoint document servers. These attacks did not affect Microsoft’s cloud-based SharePoint service but targeted companies using servers hosted within their own IT infrastructure.

The cyberattacks were linked to groups known as Linen Typhoon, Violet Typhoon, and Storm-2603—all believed to operate out of China or have connections to Chinese state interests. Microsoft says the attackers exploited known flaws in SharePoint software to gain unauthorized access to sensitive data and encryption keys.

Security Patches Released Amid Ongoing Threats

In response, Microsoft has issued critical security updates and strongly advised all customers using on-premises SharePoint servers to apply the patches immediately. The tech giant warned that systems which remain unpatched are at high risk of further attacks.

“Investigations into other actors also using these exploits are still ongoing,” Microsoft said in its official security blog. The company pledged to continue publishing updates as it learns more about the nature and scope of the breaches.

How the Attacks Worked

According to Microsoft, the hackers exploited a vulnerability that allowed them to send malicious requests to vulnerable SharePoint servers. These requests enabled them to steal cryptographic keys, allowing unauthorized access to stored data and communications.

This technique, known as key material theft, potentially gives hackers long-term access to sensitive organizational data—even after initial detection or removal.

Global Impact and Target Sectors

Charles Carmakal, CTO at Mandiant Consulting, a division of Google Cloud, stated that his firm had identified “several victims across different sectors and global regions.” He emphasized that both government institutions and businesses relying on SharePoint were primary targets.

“This was exploited in a very broad and opportunistic way before Microsoft issued a patch,” Carmakal explained. “That’s why this breach is particularly significant.”

Repeat Patterns in China-Linked Cyber Campaigns

Carmakal also noted that the hacking techniques used in this case closely resemble those seen in earlier cyber campaigns linked to Beijing-sponsored actors. He described the behavior of the attackers as opportunistic, aiming to infiltrate as many unpatched systems as possible.

Profiles of the Involved Hacking Groups

Microsoft offered deeper insights into the history and focus of each group involved:

Linen Typhoon (also known as Hafnium or APT40): This group has been active for over 13 years. Its primary objective is to steal intellectual property, with a focus on organizations involved in government affairs, defense, strategic planning, and human rights.

Violet Typhoon (associated with APT31 or Zirconium): This threat actor is primarily engaged in espionage, targeting former government and military personnel, as well as NGOs, think tanks, media outlets, academic institutions, and sectors such as finance and healthcare across the US, Europe, and East Asia.

Storm-2603: Microsoft assessed this group to be a China-based threat actor with medium confidence. Although less documented, it has demonstrated capabilities in exploiting enterprise software.

Why the Breach Matters

Cybersecurity experts stress that the SharePoint vulnerability is especially critical because it involves a widely used enterprise product. Since many organizations host sensitive and confidential data on SharePoint, successful exploitation could lead to data leaks, persistent surveillance, and long-term system compromise.

Furthermore, exploiting cryptographic material allows hackers to bypass standard authentication and remain undetected for extended periods.

Urgent Call to Action

Microsoft urges all organizations still using on-premises SharePoint servers to immediately:

  • Apply the latest security patches
  • Review their server logs for unusual activity
  • Rotate cryptographic keys and credentials
  • Consider migrating to Microsoft’s cloud-based alternatives where feasible, which are not affected by this breach

The tech giant also promised to update customers through its official channels, including the Microsoft Security Blog.

Expert Warnings on Future Threats

Experts believe these attacks are part of a broader, long-term strategy by state-sponsored cyber groups to infiltrate critical infrastructure and gain access to strategic information.

Given the scale and sophistication of the current attacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and international partners may also issue advisories to coordinate defense measures.

The Information is collected from CNBC and MSN.


Subscribe to Our Newsletter

Related Articles

Top Trending

Consumer Data Right Australia
12 Essential Facts About How Australia's Consumer Data Right Is Transforming Open Banking
how to Cook Restaurant-Quality Meals at home
The Secret to Restaurant-Quality Meals: The Ultimate Guide to Gourmet Home Cooking!
Australian Local SEO
15 Things Most People Don't Know About Australian Local SEO
understanding Attachment Styles
Understanding Attachment Styles And How They Affect Relationships!
On This Day May 10
On This Day May 10: History, Famous Birthdays, Deaths & Global Events

Fintech & Finance

Consumer Data Right Australia
12 Essential Facts About How Australia's Consumer Data Right Is Transforming Open Banking
best canadian travel credit cards 2026
8 Best Canadian Credit Cards for Travel Rewards Compared in 2026
How to Use a Balance Transfer to Pay Off Debt Faster
Pay Off Debt Faster with a Smart Balance Transfer
Best High-Yield Savings Accounts Now
Best High-Yield Savings Accounts Of 2026
Best Australian Credit Cards 2026
8 Best Australian Credit Cards for Points and Cashback in 2026

Sustainability & Living

Solar Panels Increase Home Resale Value
How Solar Panels Affect Your Home's Resale Value
Solar vs Coal
How Solar Energy Is Becoming Cheaper Than Coal
UK Blockchain Food Traceability Startups
12 UK Blockchain Solutions Ensuring Complete Farm-to-Fork Traceability
EV Adoption in Australia
13 Critical Facts About EV Adoption in Australia
Non-Toxic Home Finishes UK
10 UK Startups Revolutionizing Home Renovations with Non-Toxic Finishes

GAMING

How Cloud Gaming Is Changing Mobile Experiences
How Cloud Gaming Is Changing Mobile Experiences
The Rise of Hyper-Casual Games What's Driving Downloads
Hyper-Casual Games Growth: Key Drivers Behind Massive Downloads
M&A in Gaming
Top 10 SMEs Specializing in M&A in Gaming in USA
Top 10 SMEs Specializing in Game Engines
Top 10 SMEs Specializing in Game Engines in the United States of America
Gaming Audio Design & Music
Top 10 SMEs Specializing in Gaming Audio Design & Music in US

Business & Marketing

Investing in Nordic stock exchanges
10 Practical Tips for Investing in Nordic Stock Exchanges
Best High-Yield Savings Accounts Now
Best High-Yield Savings Accounts Of 2026
How To Conduct Performance Reviews That Actually Motivate
How To Conduct Performance Reviews That Actually Motivate
Why American Football Still Dominates Sports Culture Across The United States
Why American Football Still Dominates Sports Culture Across The United States
How To Run Effective Team Meetings That Don't Waste Time
How To Run Effective Team Meetings That Don't Waste Time: Maximize Your Productivity!

Technology & AI

GDPR compliant web design
15 Practical Tips for GDPR-Compliant Web Design
How to Build a Scalable App Architecture from Day One
Scalable App Architecture Strategies for Modern Startups
Why Most SaaS Startups Have a Strategy Gap and the Tools Closing It
Why Most SaaS Startups Have a Strategy Gap — and the Tools Closing It
Aya vs Google Translate
Aya vs Google Translate in 2026: Which AI Actually Understands Your Language
Mobile Game Psychology: How Developers Hook Players Fast
How Mobile Game Developers Hook Players With Psychology

Fitness & Wellness

understanding Attachment Styles
Understanding Attachment Styles And How They Affect Relationships!
Digital Fitness Apps in Germany
Digital Fitness Apps in Germany: 15 Startups Turning Phones Into Personal Trainers 
modern therapy misconceptions
Why Therapy Is Still Misunderstood And How To Find The Right Help
Physical Symptoms of Grieving: How It Works
Physical Symptoms of Grieving: How It Works And Why There's No Shortcut Through It
Gamified Fitness Startups in UK
15 UK’s Most Influential Gamified Fitness Startups and SMEs