Chinese Hackers Breach Microsoft SharePoint Servers Worldwide

Microsoft SharePoint Servers Hacked by Chinese Threat Actors

Microsoft has confirmed that several state-backed Chinese hacking groups have exploited vulnerabilities in its on-premises SharePoint document servers. These attacks did not affect Microsoft’s cloud-based SharePoint service but targeted companies using servers hosted within their own IT infrastructure.

The cyberattacks were linked to groups known as Linen Typhoon, Violet Typhoon, and Storm-2603—all believed to operate out of China or have connections to Chinese state interests. Microsoft says the attackers exploited known flaws in SharePoint software to gain unauthorized access to sensitive data and encryption keys.

Security Patches Released Amid Ongoing Threats

In response, Microsoft has issued critical security updates and strongly advised all customers using on-premises SharePoint servers to apply the patches immediately. The tech giant warned that systems which remain unpatched are at high risk of further attacks.

“Investigations into other actors also using these exploits are still ongoing,” Microsoft said in its official security blog. The company pledged to continue publishing updates as it learns more about the nature and scope of the breaches.

How the Attacks Worked

According to Microsoft, the hackers exploited a vulnerability that allowed them to send malicious requests to vulnerable SharePoint servers. These requests enabled them to steal cryptographic keys, allowing unauthorized access to stored data and communications.

This technique, known as key material theft, potentially gives hackers long-term access to sensitive organizational data—even after initial detection or removal.

Global Impact and Target Sectors

Charles Carmakal, CTO at Mandiant Consulting, a division of Google Cloud, stated that his firm had identified “several victims across different sectors and global regions.” He emphasized that both government institutions and businesses relying on SharePoint were primary targets.

“This was exploited in a very broad and opportunistic way before Microsoft issued a patch,” Carmakal explained. “That’s why this breach is particularly significant.”

Repeat Patterns in China-Linked Cyber Campaigns

Carmakal also noted that the hacking techniques used in this case closely resemble those seen in earlier cyber campaigns linked to Beijing-sponsored actors. He described the behavior of the attackers as opportunistic, aiming to infiltrate as many unpatched systems as possible.

Profiles of the Involved Hacking Groups

Microsoft offered deeper insights into the history and focus of each group involved:

Linen Typhoon (also known as Hafnium or APT40): This group has been active for over 13 years. Its primary objective is to steal intellectual property, with a focus on organizations involved in government affairs, defense, strategic planning, and human rights.

Violet Typhoon (associated with APT31 or Zirconium): This threat actor is primarily engaged in espionage, targeting former government and military personnel, as well as NGOs, think tanks, media outlets, academic institutions, and sectors such as finance and healthcare across the US, Europe, and East Asia.

Storm-2603: Microsoft assessed this group to be a China-based threat actor with medium confidence. Although less documented, it has demonstrated capabilities in exploiting enterprise software.

Why the Breach Matters

Cybersecurity experts stress that the SharePoint vulnerability is especially critical because it involves a widely used enterprise product. Since many organizations host sensitive and confidential data on SharePoint, successful exploitation could lead to data leaks, persistent surveillance, and long-term system compromise.

Furthermore, exploiting cryptographic material allows hackers to bypass standard authentication and remain undetected for extended periods.

Urgent Call to Action

Microsoft urges all organizations still using on-premises SharePoint servers to immediately:

  • Apply the latest security patches
  • Review their server logs for unusual activity
  • Rotate cryptographic keys and credentials
  • Consider migrating to Microsoft’s cloud-based alternatives where feasible, which are not affected by this breach

The tech giant also promised to update customers through its official channels, including the Microsoft Security Blog.

Expert Warnings on Future Threats

Experts believe these attacks are part of a broader, long-term strategy by state-sponsored cyber groups to infiltrate critical infrastructure and gain access to strategic information.

Given the scale and sophistication of the current attacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and international partners may also issue advisories to coordinate defense measures.

The Information is collected from CNBC and MSN.


Subscribe to Our Newsletter

Related Articles

Top Trending

Sovereign AI Infrastructure
7 Things You Need to Know About Canada's National AI Strategy and Sovereign AI Infrastructure
Generative AI for Canadian Startups
8 Proven Ways Canadian Startups Are Using Generative AI to Compete Globally
Structured Data for Events and Webinars
Transform Your Marketing Using Structured Data for Events and Webinars!
Truecasting in Relationships
Why Truecasting in Relationships is the 2026 Standard for Finding Real Connection
Kharg Island Iran Oil Lifeline
Trump’s Strategic Gamble: Why Iran’s Oil Lifeline Kharg Island Remains Untouched

Fintech & Finance

Gamified Finance Education for Kids
Level Up Your Child’s Future with “Gamified Finance Education for Kids”!
The Complete Guide to Online Surveys for Money Payouts
The Complete Guide to Online Surveys for Money Payouts
Is American Economic Expansion Sustainable
Is American Economic Expansion Sustainable? A Full Analysis (2025–2026)
Home Loan Eligibility: How Much Can You Get on Your Salary?
How Much Home Loan Can You Get on Your Salary and What Are the Other Eligibility Factors?
The ROI of a Master's Degree in 2026
The Surprising Truth About the ROI Of A Master's Degree In 2026

Sustainability & Living

Vertical Forests Architecture That Breathes
Transform Your Space with Vertical Forests: Architecture That Breathes!
Sustainable Fashion How to Build a Capsule Wardrobe
Sustainable Fashion: How to Build A Capsule Wardrobe
Blue Economy
Dive into The "Blue Economy": Protecting Our Oceans Together!
Sustainable Cities Urban Planning for a Green Future
Transform Your City with Sustainable Cities: Urban Planning for A Green Future
best smart blinds
12 Best Smart Blinds and Shades [Automated Curtains]

GAMING

best gaming headsets with mic monitoring
12 Best Gaming Headsets with Mic Monitoring
Best capture cards for streaming
10 Best Capture Cards for Streaming Console Gameplay
Gamification in Education Beyond Points and Badges
Engage Students Like Never Before: “Gamification in Education: Beyond Points and Badges”
iGaming Player Wellbeing: Strategies for Balanced Play
The Debate Behind iGaming: How Best to Use for Balanced Player Wellbeing
Hypackel Games
Hypackel Games A Look at Player Shaped Online Play

Business & Marketing

Confidence vs Ego Knowing the Difference
Confidence Vs Ego: Knowing The Difference [Mastering Self-Identity Explained]
The Complete Guide to Online Surveys for Money Payouts
The Complete Guide to Online Surveys for Money Payouts
Emotional Intelligence skill
Emotional Intelligence: The Skill AI Can't Replace [Unlock Your Potential]
Power Of Vulnerability In Leadership
The Power Of Vulnerability In Leadership And Life [Transform Your Impact]
Home Loan Eligibility: How Much Can You Get on Your Salary?
How Much Home Loan Can You Get on Your Salary and What Are the Other Eligibility Factors?

Technology & AI

How to Use AI For Content Creation Without Losing Your Voice
How to Use AI for Content Creation Without Losing Your Authentic Voice
Robots.txt File
Robots.txt File: The Most Dangerous File On Your Website [Beware]
Andrew Ting MD: Quality Data Powers Safer Healthcare AI
Andrew Ting MD Explains Why High-Quality Medical Data Is Key to Smarter, Safer AI in Healthcare
French Tech Visa a gateway to europe
The French "Tech Visa": A Gateway to Europe! Boost Your Career
What Is ImagineLab.art
What Is ImagineLab.art? Inside Editorialge Media's Unified AI Creative Platform

Fitness & Wellness

Mindfulness For Skeptics
Mindfulness For Skeptics: Science-Backed Benefits You Must Know!
Burnout Recovery A Step-by-Step Guide
Transform Your Wellness with Burnout Recovery: A Step-by-Step Guide
best journals for gratitude and mindfulness
10 Best Journals for Gratitude and Mindfulness
Finding Purpose Ikigai for the 2026 Professional
Finding Purpose: Ikigai for The 2026 Professional
Visualizing Success The Science Behind Mental Imagery
Visualizing Success: The Science Behind Mental Imagery