Chinese Hackers Breach Microsoft SharePoint Servers Worldwide

Microsoft SharePoint Servers Hacked by Chinese Threat Actors

Microsoft has confirmed that several state-backed Chinese hacking groups have exploited vulnerabilities in its on-premises SharePoint document servers. These attacks did not affect Microsoft’s cloud-based SharePoint service but targeted companies using servers hosted within their own IT infrastructure.

The cyberattacks were linked to groups known as Linen Typhoon, Violet Typhoon, and Storm-2603—all believed to operate out of China or have connections to Chinese state interests. Microsoft says the attackers exploited known flaws in SharePoint software to gain unauthorized access to sensitive data and encryption keys.

Security Patches Released Amid Ongoing Threats

In response, Microsoft has issued critical security updates and strongly advised all customers using on-premises SharePoint servers to apply the patches immediately. The tech giant warned that systems which remain unpatched are at high risk of further attacks.

“Investigations into other actors also using these exploits are still ongoing,” Microsoft said in its official security blog. The company pledged to continue publishing updates as it learns more about the nature and scope of the breaches.

How the Attacks Worked

According to Microsoft, the hackers exploited a vulnerability that allowed them to send malicious requests to vulnerable SharePoint servers. These requests enabled them to steal cryptographic keys, allowing unauthorized access to stored data and communications.

This technique, known as key material theft, potentially gives hackers long-term access to sensitive organizational data—even after initial detection or removal.

Global Impact and Target Sectors

Charles Carmakal, CTO at Mandiant Consulting, a division of Google Cloud, stated that his firm had identified “several victims across different sectors and global regions.” He emphasized that both government institutions and businesses relying on SharePoint were primary targets.

“This was exploited in a very broad and opportunistic way before Microsoft issued a patch,” Carmakal explained. “That’s why this breach is particularly significant.”

Repeat Patterns in China-Linked Cyber Campaigns

Carmakal also noted that the hacking techniques used in this case closely resemble those seen in earlier cyber campaigns linked to Beijing-sponsored actors. He described the behavior of the attackers as opportunistic, aiming to infiltrate as many unpatched systems as possible.

Profiles of the Involved Hacking Groups

Microsoft offered deeper insights into the history and focus of each group involved:

Linen Typhoon (also known as Hafnium or APT40): This group has been active for over 13 years. Its primary objective is to steal intellectual property, with a focus on organizations involved in government affairs, defense, strategic planning, and human rights.

Violet Typhoon (associated with APT31 or Zirconium): This threat actor is primarily engaged in espionage, targeting former government and military personnel, as well as NGOs, think tanks, media outlets, academic institutions, and sectors such as finance and healthcare across the US, Europe, and East Asia.

Storm-2603: Microsoft assessed this group to be a China-based threat actor with medium confidence. Although less documented, it has demonstrated capabilities in exploiting enterprise software.

Why the Breach Matters

Cybersecurity experts stress that the SharePoint vulnerability is especially critical because it involves a widely used enterprise product. Since many organizations host sensitive and confidential data on SharePoint, successful exploitation could lead to data leaks, persistent surveillance, and long-term system compromise.

Furthermore, exploiting cryptographic material allows hackers to bypass standard authentication and remain undetected for extended periods.

Urgent Call to Action

Microsoft urges all organizations still using on-premises SharePoint servers to immediately:

  • Apply the latest security patches
  • Review their server logs for unusual activity
  • Rotate cryptographic keys and credentials
  • Consider migrating to Microsoft’s cloud-based alternatives where feasible, which are not affected by this breach

The tech giant also promised to update customers through its official channels, including the Microsoft Security Blog.

Expert Warnings on Future Threats

Experts believe these attacks are part of a broader, long-term strategy by state-sponsored cyber groups to infiltrate critical infrastructure and gain access to strategic information.

Given the scale and sophistication of the current attacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and international partners may also issue advisories to coordinate defense measures.

The Information is collected from CNBC and MSN.


Subscribe to Our Newsletter

Related Articles

Top Trending

Denmark wind energy
12 Key Facts About Denmark's Wind Energy Success
Strait of Hormuz Blockade 2026
Chokepoint in Chaos: How the 2026 Strait of Hormuz Blockade is Rewriting Global Security and Energy
US Startups Engineering Lab-Grown Regenerative Fabrics
10 US Startups Engineering Lab-Grown Regenerative Fabrics for Everyday Wear
AI-Powered CRM Startups in the USA
20 AI-Powered CRM Startups in the USA Leading the 2026 Sales Revolution
Sweden work life balance
10 Surprising Facts About How Sweden's Work-Life Balance Culture Is Reshaping Mental Health Norms

Fintech & Finance

Top Mobile Apps for Personal Finance Management
Top Mobile Apps for Personal Finance Management You Must Try
Top QuickBooks Errors Preventing Company File Access
Top 10 QuickBooks Errors Preventing Company File Access
Best Neobanks New Zealand 2025
9 Best Neobanks and Digital Finance Apps Available in New Zealand 2025
Irish Credit Union Digital Generation
7 Key Ways Irish Credit Unions Are Competing with Neobanks for the Digital Generation
How Fintech Is Transforming Emerging Market Economies
How Fintech Is Transforming Emerging Market Economies

Sustainability & Living

US Startups Engineering Lab-Grown Regenerative Fabrics
10 US Startups Engineering Lab-Grown Regenerative Fabrics for Everyday Wear
The Future of Fast Charging What's Coming Next
The Future of Fast Charging: Trends You Must Know
How Solid-State Batteries Will Change the EV Industry
How Solid-State Batteries Will Change The EV Industry
The Real Environmental Cost of Electric Vehicles
Hidden Environmental Impact of Electric Vehicles
How EV Battery Technology Is Evolving
EV Battery Technology in 2026: Key Innovations Driving Change

GAMING

What Most Users Still Get Wrong When Comparing CS2 Skin Platforms
What Most Users Still Get Wrong When Comparing CS2 Skin Platforms?
How Technology Is Transforming the Online Gaming Industry
How Technology Is Transforming the Online Gaming Industry
Naruto Uzumaki In The Manga
Naruto Uzumaki In The Manga: How The Original Source Material Shaped The Character
Online Game
Why Online Game Promotions Make Digital Entertainment More Engaging
Geek Appeal of Randomized Games
The Geek Appeal of Randomized Games Like Pokies

Business & Marketing

Trade Show Exhibit Trends 2026: Custom, Rental & Portable Designs That Steal the Spotlight
Trade Show Exhibit Trends 2026: Custom, Rental & Portable Designs That Steal the Spotlight
China EV Market Dominance: How China Leads Global EV Growth
How China Is Dominating The Global EV Market
Top 10 Productivity Apps for Remote Workers
10 Essential Remote Work Productivity Tools You Should Use
Emerging E-Commerce Markets
Top Emerging Markets for E-Commerce Entrepreneurs
Top Mobile Apps for Personal Finance Management
Top Mobile Apps for Personal Finance Management You Must Try

Technology & AI

AI-Powered CRM Startups in the USA
20 AI-Powered CRM Startups in the USA Leading the 2026 Sales Revolution
Dark Mode Web Design
How Dark Mode Is Becoming A Standard Web Design Feature
Best CI/CD Tools
The Best CI/CD Tools For Software Development Teams [The Ultimate Guide]
How to Build a Portfolio Website That Gets You Hired
Job-Winning Portfolio Website Tips to Get You Hired in 2026
Top 10 Productivity Apps for Remote Workers
10 Essential Remote Work Productivity Tools You Should Use

Fitness & Wellness

Best fitness apps in India
Sweat Goes Digital: 10 Indian Health Tech Apps Rewriting the Workout Rulebook
AI Personal Trainer Startups UK
10 UK AI Personal Trainer Startups Redefining Home Fitness: Get Fit Smarter!
Biogenic Luxury
The Rise of Biogenic Luxury: Ancestral Wisdom for the High-Performance Professional
cost of untreated mental health on productivity
10 Eye-Opening Facts About the Real Cost of Untreated Mental Health Conditions on American Productivity
British Men's Mental Health 2026
7 Key Facts About How British Men Are Finally Starting to Talk About Mental Health — And Why It Matters