九一星空无限

ZB ZB
Opinion
Live now
Start time
Playing for
End time
Listen live
Up next
ZB

The Microsoft flaw causing havoc in global cybersecurity systems

Author
Ellen Nakashima, Yvonne Wingett Sanchez, Joseph Menn,
Publish Date
Mon, 21 Jul 2025, 11:17am
A security flaw in Microsoft's SharePoint servers has been exploited by hackers. Photo / Getty Images
A security flaw in Microsoft's SharePoint servers has been exploited by hackers. Photo / Getty Images

The Microsoft flaw causing havoc in global cybersecurity systems

Author
Ellen Nakashima, Yvonne Wingett Sanchez, Joseph Menn,
Publish Date
Mon, 21 Jul 2025, 11:17am

Hackers exploited a major security flaw in widely used Microsoft server software to launch a global attack on government agencies and businesses in the past few days, breaching US federal and state agencies, universities, energy companies and an Asian telecommunications company, according to state officials and private researchers.

The US Government and partners in Canada and Australia are investigating the compromise of SharePoint servers, which provide a platform for sharing and managing documents. Tens of thousands of such servers are at risk, experts said, and Microsoft has issued no patch for the flaw, leaving victims around the world scrambling to respond.

The 鈥渮ero-day鈥 attack, so called because it targeted a previously unknown vulnerability, is only the latest cyber security embarrassment for Microsoft. Last year, the company was faulted by a panel of US Government and industry experts for lapses that enabled a 2023 targeted Chinese hack of US government emails, including those of then-Commerce Secretary Gina Raimondo.

This most recent attack compromises only those servers housed within an organisation 鈥 not those in the cloud, such as Microsoft 365, officials said. Microsoft has suggested users make modifications to SharePoint server programs or unplug them from the internet to stanch the breach. Microsoft issued an alert to customers but declined to comment further.

鈥淎nybody who鈥檚 got a hosted SharePoint server has got a problem,鈥 said Adam Meyers, senior vice president with CrowdStrike, a cyber security firm. 鈥淚t鈥檚 a significant vulnerability.鈥

The FBI said it was aware of the matter. 鈥淲e are working closely with our federal government and private sector partners,鈥 it said.

鈥淲e are seeing attempts to exploit thousands of SharePoint servers globally before a patch is available,鈥 said Pete Renals, a senior manager with Palo Alto Networks鈥 Unit 42. 鈥淲e have identified dozens of compromised organisations spanning both commercial and government sectors.鈥

With access to these servers, which often connect to Outlook email, Teams and other core services, a breach can lead to theft of sensitive data as well as password harvesting, Netherlands-based research company Eye Security noted. What鈥檚 also alarming, researchers said, is that the hackers have gained access to keys that may allow them to regain entry even after a system is patched.

鈥淪o pushing out a patch on Monday or Tuesday doesn鈥檛 help anybody who鈥檚 been compromised in the past 72 hours,鈥 said one researcher, who spoke on the condition of anonymity because a federal investigation is ongoing.

It was not immediately clear who is behind the hacking of global reach or what its ultimate goal is. One private research company found the hackers targeting servers in China as well as a state legislature in the eastern United States. Eye Security said it has tracked more than 50 breaches, including at an energy company in a large state and several European government agencies.

At least two US federal agencies have seen their servers breached, according to researchers, who said victim confidentiality agreements prevent them from naming the targets.

One state official in the eastern US said the attackers had 鈥渉ijacked鈥 a repository of documents provided to the public to help residents understand how their government works. The agency involved can no longer access the material, but it wasn鈥檛 clear whether it was deleted.

鈥淲e will need to make these documents available again in a different repository,鈥 the official said, speaking on the condition of anonymity to discuss a developing situation.

Such 鈥渨iper鈥 attacks are rare, and this one left officials alarmed in other states as word spread. Some security companies said they had not seen deletions in the SharePoint attacks, only the theft of cryptographic keys that would allow the hackers to reenter the servers.

In Arizona, cybersecurity officials were convening with state, local and tribal officials to assess potential vulnerabilities and share information.

鈥淭here is definitely a mad scramble across the nation right now,鈥 said one person familiar with the state鈥檚 response.

The breaches occurred after Microsoft fixed a security flaw this month. The attackers realised they could use a similar vulnerability, according to the Department of Homeland Security鈥檚 Cybersecurity and Infrastructure Security Agency.

CISA spokeswoman Marci McCarthy said the agency was alerted to the issue on Friday by a cyber research firm and immediately contacted Microsoft.

Microsoft has been faulted in the past for issuing fixes that are too narrowly designed and leave similar avenues open to attack. The company, one of the largest tech vendors to governments, has had other major stumbles in the past two years, including breaches of its own corporate networks and executives鈥 emails. A programming flaw in its cloud services also allowed China-backed hackers to steal email from federal officials.

On Friday, Microsoft said it would stop using China-based engineers to support Defence Department cloud-computing programs after a report by investigative outlet ProPublica revealed the practice, prompting Defence Secretary Pete Hegseth to order a review of Pentagon cloud deals.

The nonprofit Centre for Internet Security, which staffs an information-sharing group for state and local governments, notified about 100 organisations that they were vulnerable and potentially compromised, said Randy Rose, the organisation鈥檚 vice president. Those warned included public schools and universities.

The process took six hours on Saturday night 鈥 much longer than it otherwise would have, because the threat-intelligence and incident-response teams have been cut by 65% as CISA slashed funding, Rose said.

Despite CISA being led by an acting director, as nominee Sean Plankey has not been confirmed, agency officials have been 鈥渨orking around the clock鈥 on the issue, McCarthy said. 鈥淣o one has been asleep at the wheel.鈥

Others that were breached included a government agency in Spain, a local agency in Albuquerque and a university in Brazil, security researchers said.

鈥 Patrick Marley, Sarah Ellison and Aaron Schaffer contributed to this report.

Take your Radio, Podcasts and Music with you