Chinese Hackers Breach Microsoft SharePoint Servers Worldwide

Microsoft SharePoint Servers Hacked by Chinese Threat Actors

Microsoft has confirmed that several state-backed Chinese hacking groups have exploited vulnerabilities in its on-premises SharePoint document servers. These attacks did not affect Microsoft’s cloud-based SharePoint service but targeted companies using servers hosted within their own IT infrastructure.

The cyberattacks were linked to groups known as Linen Typhoon, Violet Typhoon, and Storm-2603—all believed to operate out of China or have connections to Chinese state interests. Microsoft says the attackers exploited known flaws in SharePoint software to gain unauthorized access to sensitive data and encryption keys.

Security Patches Released Amid Ongoing Threats

In response, Microsoft has issued critical security updates and strongly advised all customers using on-premises SharePoint servers to apply the patches immediately. The tech giant warned that systems which remain unpatched are at high risk of further attacks.

“Investigations into other actors also using these exploits are still ongoing,” Microsoft said in its official security blog. The company pledged to continue publishing updates as it learns more about the nature and scope of the breaches.

How the Attacks Worked

According to Microsoft, the hackers exploited a vulnerability that allowed them to send malicious requests to vulnerable SharePoint servers. These requests enabled them to steal cryptographic keys, allowing unauthorized access to stored data and communications.

This technique, known as key material theft, potentially gives hackers long-term access to sensitive organizational data—even after initial detection or removal.

Global Impact and Target Sectors

Charles Carmakal, CTO at Mandiant Consulting, a division of Google Cloud, stated that his firm had identified “several victims across different sectors and global regions.” He emphasized that both government institutions and businesses relying on SharePoint were primary targets.

“This was exploited in a very broad and opportunistic way before Microsoft issued a patch,” Carmakal explained. “That’s why this breach is particularly significant.”

Repeat Patterns in China-Linked Cyber Campaigns

Carmakal also noted that the hacking techniques used in this case closely resemble those seen in earlier cyber campaigns linked to Beijing-sponsored actors. He described the behavior of the attackers as opportunistic, aiming to infiltrate as many unpatched systems as possible.

Profiles of the Involved Hacking Groups

Microsoft offered deeper insights into the history and focus of each group involved:

Linen Typhoon (also known as Hafnium or APT40): This group has been active for over 13 years. Its primary objective is to steal intellectual property, with a focus on organizations involved in government affairs, defense, strategic planning, and human rights.

Violet Typhoon (associated with APT31 or Zirconium): This threat actor is primarily engaged in espionage, targeting former government and military personnel, as well as NGOs, think tanks, media outlets, academic institutions, and sectors such as finance and healthcare across the US, Europe, and East Asia.

Storm-2603: Microsoft assessed this group to be a China-based threat actor with medium confidence. Although less documented, it has demonstrated capabilities in exploiting enterprise software.

Why the Breach Matters

Cybersecurity experts stress that the SharePoint vulnerability is especially critical because it involves a widely used enterprise product. Since many organizations host sensitive and confidential data on SharePoint, successful exploitation could lead to data leaks, persistent surveillance, and long-term system compromise.

Furthermore, exploiting cryptographic material allows hackers to bypass standard authentication and remain undetected for extended periods.

Urgent Call to Action

Microsoft urges all organizations still using on-premises SharePoint servers to immediately:

  • Apply the latest security patches
  • Review their server logs for unusual activity
  • Rotate cryptographic keys and credentials
  • Consider migrating to Microsoft’s cloud-based alternatives where feasible, which are not affected by this breach

The tech giant also promised to update customers through its official channels, including the Microsoft Security Blog.

Expert Warnings on Future Threats

Experts believe these attacks are part of a broader, long-term strategy by state-sponsored cyber groups to infiltrate critical infrastructure and gain access to strategic information.

Given the scale and sophistication of the current attacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and international partners may also issue advisories to coordinate defense measures.

The Information is collected from CNBC and MSN.


Subscribe to Our Newsletter

Related Articles

Top Trending

Goku AI Text-to-Video
Goku AI: The New Text-to-Video Competitor Challenging Sora
US-China Relations 2026
US-China Relations 2026: The "Great Power" Competition Report
AI Market Correction 2026
The "AI Bubble" vs. Real Utility: A 2026 Market Correction?
NVIDIA Cosmos
NVIDIA’s "Cosmos" AI Model & The Vera Rubin Superchip
Styx Blades of Greed
The Goblin Goes Open World: How Styx: Blades of Greed is Reinventing the AA Stealth Genre.

LIFESTYLE

Benefits of Living in an Eco-Friendly Community featured image
Go Green Together: 12 Benefits of Living in an Eco-Friendly Community!
Happy new year 2026 global celebration
Happy New Year 2026: Celebrate Around the World With Global Traditions
dubai beach day itinerary
From Sunrise Yoga to Sunset Cocktails: The Perfect Beach Day Itinerary – Your Step-by-Step Guide to a Day by the Water
Ford F-150 Vs Ram 1500 Vs Chevy Silverado
The "Big 3" Battle: 10 Key Differences Between the Ford F-150, Ram 1500, and Chevy Silverado
Zytescintizivad Spread Taking Over Modern Kitchens
Zytescintizivad Spread: A New Superfood Taking Over Modern Kitchens

Entertainment

Samsung’s 130-Inch Micro RGB TV The Wall Comes Home
Samsung’s 130-Inch Micro RGB TV: The "Wall" Comes Home
MrBeast Copyright Gambit
Beyond The Paywall: The MrBeast Copyright Gambit And The New Rules Of Co-Streaming Ownership
Stranger Things Finale Crashes Netflix
Stranger Things Finale Draws 137M Views, Crashes Netflix
Demon Slayer Infinity Castle Part 2 release date
Demon Slayer Infinity Castle Part 2 Release Date: Crunchyroll Denies Sequel Timing Rumors
BTS New Album 20 March 2026
BTS to Release New Album March 20, 2026

GAMING

Styx Blades of Greed
The Goblin Goes Open World: How Styx: Blades of Greed is Reinventing the AA Stealth Genre.
Resident Evil Requiem Switch 2
Resident Evil Requiem: First Look at "Open City" Gameplay on Switch 2
High-performance gaming setup with clear monitor display and low-latency peripherals. n Improve Your Gaming Performance Instantly
Improve Your Gaming Performance Instantly: 10 Fast Fixes That Actually Work
Learning Games for Toddlers
Learning Games For Toddlers: Top 10 Ad-Free Educational Games For 2026
Gamification In Education
Screen Time That Counts: Why Gamification Is the Future of Learning

BUSINESS

IMF 2026 Outlook Stable But Fragile
Global Economic Outlook: IMF Predicts 3.1% Growth but "Downside Risks" Remain
India Rice Exports
India’s Rice Dominance: How Strategic Export Shifts are Reshaping South Asian Trade in 2026
Mistakes to Avoid When Seeking Small Business Funding featured image
15 Mistakes to Avoid As New Entrepreneurs When Seeking Small Business Funding
Global stock markets break record highs featured image
Global Stock Markets Surge to Record Highs Across Continents: What’s Powering the Rally—and What Could Break It
Embodied Intelligence
Beyond Screen-Bound AI: How Embodied Intelligence is Reshaping Industrial Logistics in 2026

TECHNOLOGY

Goku AI Text-to-Video
Goku AI: The New Text-to-Video Competitor Challenging Sora
AI Market Correction 2026
The "AI Bubble" vs. Real Utility: A 2026 Market Correction?
NVIDIA Cosmos
NVIDIA’s "Cosmos" AI Model & The Vera Rubin Superchip
Styx Blades of Greed
The Goblin Goes Open World: How Styx: Blades of Greed is Reinventing the AA Stealth Genre.
Samsung’s 130-Inch Micro RGB TV The Wall Comes Home
Samsung’s 130-Inch Micro RGB TV: The "Wall" Comes Home

HEALTH

Bio Wearables For Stress
Post-Holiday Wellness: The Rise of "Bio-Wearables" for Stress
ChatGPT Health Medical Records
Beyond the Chatbot: Why OpenAI’s Entry into Medical Records is the Ultimate Test of Public Trust in the AI Era
A health worker registers an elderly patient using a laptop at a rural health clinic in Africa
Digital Health Sovereignty: The 2026 Push for National Digital Health Records in Rural Economies
Digital Detox for Kids
Digital Detox for Kids: Balancing Online Play With Outdoor Fun [2026 Guide]
Worlds Heaviest Man Dies
Former World's Heaviest Man Dies at 41: 1,322-Pound Weight Led to Fatal Kidney Infection