Chinese Hackers Breach Microsoft SharePoint Servers Worldwide

Microsoft SharePoint Servers Hacked by Chinese Threat Actors

Microsoft has confirmed that several state-backed Chinese hacking groups have exploited vulnerabilities in its on-premises SharePoint document servers. These attacks did not affect Microsoft’s cloud-based SharePoint service but targeted companies using servers hosted within their own IT infrastructure.

The cyberattacks were linked to groups known as Linen Typhoon, Violet Typhoon, and Storm-2603—all believed to operate out of China or have connections to Chinese state interests. Microsoft says the attackers exploited known flaws in SharePoint software to gain unauthorized access to sensitive data and encryption keys.

Security Patches Released Amid Ongoing Threats

In response, Microsoft has issued critical security updates and strongly advised all customers using on-premises SharePoint servers to apply the patches immediately. The tech giant warned that systems which remain unpatched are at high risk of further attacks.

“Investigations into other actors also using these exploits are still ongoing,” Microsoft said in its official security blog. The company pledged to continue publishing updates as it learns more about the nature and scope of the breaches.

How the Attacks Worked

According to Microsoft, the hackers exploited a vulnerability that allowed them to send malicious requests to vulnerable SharePoint servers. These requests enabled them to steal cryptographic keys, allowing unauthorized access to stored data and communications.

This technique, known as key material theft, potentially gives hackers long-term access to sensitive organizational data—even after initial detection or removal.

Global Impact and Target Sectors

Charles Carmakal, CTO at Mandiant Consulting, a division of Google Cloud, stated that his firm had identified “several victims across different sectors and global regions.” He emphasized that both government institutions and businesses relying on SharePoint were primary targets.

“This was exploited in a very broad and opportunistic way before Microsoft issued a patch,” Carmakal explained. “That’s why this breach is particularly significant.”

Repeat Patterns in China-Linked Cyber Campaigns

Carmakal also noted that the hacking techniques used in this case closely resemble those seen in earlier cyber campaigns linked to Beijing-sponsored actors. He described the behavior of the attackers as opportunistic, aiming to infiltrate as many unpatched systems as possible.

Profiles of the Involved Hacking Groups

Microsoft offered deeper insights into the history and focus of each group involved:

Linen Typhoon (also known as Hafnium or APT40): This group has been active for over 13 years. Its primary objective is to steal intellectual property, with a focus on organizations involved in government affairs, defense, strategic planning, and human rights.

Violet Typhoon (associated with APT31 or Zirconium): This threat actor is primarily engaged in espionage, targeting former government and military personnel, as well as NGOs, think tanks, media outlets, academic institutions, and sectors such as finance and healthcare across the US, Europe, and East Asia.

Storm-2603: Microsoft assessed this group to be a China-based threat actor with medium confidence. Although less documented, it has demonstrated capabilities in exploiting enterprise software.

Why the Breach Matters

Cybersecurity experts stress that the SharePoint vulnerability is especially critical because it involves a widely used enterprise product. Since many organizations host sensitive and confidential data on SharePoint, successful exploitation could lead to data leaks, persistent surveillance, and long-term system compromise.

Furthermore, exploiting cryptographic material allows hackers to bypass standard authentication and remain undetected for extended periods.

Urgent Call to Action

Microsoft urges all organizations still using on-premises SharePoint servers to immediately:

  • Apply the latest security patches
  • Review their server logs for unusual activity
  • Rotate cryptographic keys and credentials
  • Consider migrating to Microsoft’s cloud-based alternatives where feasible, which are not affected by this breach

The tech giant also promised to update customers through its official channels, including the Microsoft Security Blog.

Expert Warnings on Future Threats

Experts believe these attacks are part of a broader, long-term strategy by state-sponsored cyber groups to infiltrate critical infrastructure and gain access to strategic information.

Given the scale and sophistication of the current attacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and international partners may also issue advisories to coordinate defense measures.

The Information is collected from CNBC and MSN.


Subscribe to Our Newsletter

Related Articles

Top Trending

What Is The Sharing Economy
What Is The Sharing Economy: Borrowing Tools Instead Of Buying [Save Big]
How To Sell Notion Templates
Write Once, Sell Forever: How To Sell Notion Templates In 2026 [Profit Blueprint]
Why Local SaaS Hosting Matters More Than Ever
Data Sovereignty: Why Local SaaS Hosting Matters More Than Ever
10 Side Hustles You Can Start This Weekend with $0 and a Laptop
10 Side Hustles You Can Start This Weekend with $0 and a Laptop
How to Monetize Your Scroll Time on TikTok
From Viewer to Creator: How to Monetize Your "Scroll Time" on TikTok [The Ultimate Guide]

Fintech & Finance

high yield savings accounts in January 2026
Top 5 High-Yield Savings Accounts (HYSA) for January 2026
What Is Teen Banking
What Is Teen Banking: The Race To Capture The Gen Alpha Market [The Next Big Thing]
How to Conduct a SaaS Audit Cutting Bloat in Q1 2026
How To Conduct A SaaS Audit: Cutting Bloat In Q1 2026
The Evolution of DAOs Are They Replacing Corporations
The Evolution Of DAOs: Are They Replacing Corporations?
How Regular Credit Score Tracking with Bajaj Markets Helps Prevent Loan Rejection
How Regular Credit Score Tracking with Bajaj Markets Helps Prevent Loan Rejection

Sustainability & Living

What Is The Sharing Economy
What Is The Sharing Economy: Borrowing Tools Instead Of Buying [Save Big]
Net-Zero Buildings
Net-Zero Buildings: How To Achieve Zero Emissions [The Ultimate Pathway to a Greener Future]
Fusion Energy
Fusion Energy: Updates on the Holy Grail of Power [Revisiting The Perspective]
Tiny homes
Tiny Homes: A Solution to Homelessness or Poverty with Better Branding?
Smart Windows The Tech Saving Energy in 2026 Skyscrapers
Smart Windows: The Tech Saving Energy in 2026 Skyscrapers

GAMING

Monster Hunter Wilds Story Length
How Many Chapters Are In Monster Hunter Wilds? Story Length Guide
steam deck alternatives in 2026
Top 5 Handheld Consoles to Buy in 2026 (That Aren't the Steam Deck)
Game Preservation in the Digital Age What Happens When Servers Die
Game Preservation In The Digital Age: What Happens When Servers Die?
How Many Chapters in Monster Hunter Wilds
How Many Chapters in Monster Hunter Wilds: Breakdown of All 6 Story Chapters
Monster Hunter Wilds Co-Op
How To Play With Friends In Monster Hunter Wilds Co-Op Guide

Business & Marketing

How To Sell Notion Templates
Write Once, Sell Forever: How To Sell Notion Templates In 2026 [Profit Blueprint]
10 Side Hustles You Can Start This Weekend with $0 and a Laptop
10 Side Hustles You Can Start This Weekend with $0 and a Laptop
7 AI-First Side Hustles That Didn't Exist 6 Months Ago
7 "AI-First" Side Hustles That Didn't Exist 6 Months Ago
How to Conduct a SaaS Audit Cutting Bloat in Q1 2026
How To Conduct A SaaS Audit: Cutting Bloat In Q1 2026
Managing Gen Alpha Interns What Leaders Need to Know
Managing Gen Alpha Interns: What Leaders Need To Know

Technology & AI

Why Local SaaS Hosting Matters More Than Ever
Data Sovereignty: Why Local SaaS Hosting Matters More Than Ever
Prompt Engineering Is Dead Here Are the 4 Tech Skills Actually Paying
Prompt Engineering Is Dead: Here Are the 4 Tech Skills Actually Paying in 2026
high income skills
Stop Driving Uber: 5 High-Paying Digital Skills You Can Learn in a Weekend
7 AI-First Side Hustles That Didn't Exist 6 Months Ago
7 "AI-First" Side Hustles That Didn't Exist 6 Months Ago
steam deck alternatives in 2026
Top 5 Handheld Consoles to Buy in 2026 (That Aren't the Steam Deck)

Fitness & Wellness

Mental Health First Aid for Managers
Mental Health First Aid: A Mandatory Skill for 2026 Managers
The Quiet Wellness Movement Reclaiming Mental Focus in the Hyper-Digital Era
The “Quiet Wellness” Movement: Reclaiming Mental Focus in the Hyper-Digital Era
Cognitive Optimization
Brain Health is the New Weight Loss: The Rise of Cognitive Optimization
The Analogue January Trend Why Gen Z is Ditching Screens for 30 Days
The "Analogue January" Trend: Why Gen Z is Ditching Screens for 30 Days
Gut Health Revolution The Smart Probiotic Tech Winning CES
Gut Health Revolution: The "Smart Probiotic" Tech Winning CES