Google, Microsoft say Chinese hackers are exploiting SharePoint zero-day
-
Security researchers at Google and Microsoft say they have evidence that hackers backed by China are exploiting a zero-day bug in Microsoft SharePoint, as companies around the world scramble to patch the flaw.
The bug, known officially as CVE-2025-53770 and discovered last weekend, allows hackers to steal sensitive private keys from self-hosted versions of SharePoint, a software server widely used by companies and organizations to store and share internal documents. Once exploited, an attacker can use the bug to remotely plant malware and gain access to the files and data stored within, as well as gain access to other systems on the same network.
-
Security researchers at Google and Microsoft say they have evidence that hackers backed by China are exploiting a zero-day bug in Microsoft SharePoint, as companies around the world scramble to patch the flaw.
The bug, known officially as CVE-2025-53770 and discovered last weekend, allows hackers to steal sensitive private keys from self-hosted versions of SharePoint, a software server widely used by companies and organizations to store and share internal documents. Once exploited, an attacker can use the bug to remotely plant malware and gain access to the files and data stored within, as well as gain access to other systems on the same network.
The attack exploits SharePoint vulnerabilities originally disclosed at a Berlin hacking competition in May, where a Vietnamese cybersecurity researcher received a $100,000 bounty for discovering the flaws. Reuters reported that Microsoft was allegedly informed of the vulnerabilities in May but failed to fully address them in an initial July patch
And
Several cybersecurity experts compared the SharePoint campaign to the 2021 Microsoft Exchange server attacks that compromised US government systems. Former FBI Cyber Unit deputy director Cynthia Kaiser warned that hackers "already in their systems may lie dormant for extended periods before operationalizing"
Just shows in what a poor position US is now. Allies discovered it, reported it, feds didn't prepare for it and Chinese are in. Incredible incompetence except for US allies that despite US' isolationism still care.
-
The attack exploits SharePoint vulnerabilities originally disclosed at a Berlin hacking competition in May, where a Vietnamese cybersecurity researcher received a $100,000 bounty for discovering the flaws. Reuters reported that Microsoft was allegedly informed of the vulnerabilities in May but failed to fully address them in an initial July patch
And
Several cybersecurity experts compared the SharePoint campaign to the 2021 Microsoft Exchange server attacks that compromised US government systems. Former FBI Cyber Unit deputy director Cynthia Kaiser warned that hackers "already in their systems may lie dormant for extended periods before operationalizing"
Just shows in what a poor position US is now. Allies discovered it, reported it, feds didn't prepare for it and Chinese are in. Incredible incompetence except for US allies that despite US' isolationism still care.
Yeah; allies still care because of the US military industrial complex. Compromising the US still compromises a large chunk of the world, making things even worse for everyone than the current US administration can do on its own.
-
Security researchers at Google and Microsoft say they have evidence that hackers backed by China are exploiting a zero-day bug in Microsoft SharePoint, as companies around the world scramble to patch the flaw.
The bug, known officially as CVE-2025-53770 and discovered last weekend, allows hackers to steal sensitive private keys from self-hosted versions of SharePoint, a software server widely used by companies and organizations to store and share internal documents. Once exploited, an attacker can use the bug to remotely plant malware and gain access to the files and data stored within, as well as gain access to other systems on the same network.
This is what you get when you don't patch your shit after being told about it MONTHS before it was demonstrated, and MONTHS after.
-
This is what you get when you don't patch your shit after being told about it MONTHS before it was demonstrated, and MONTHS after.
This is a zero-day bug though?
-
Security researchers at Google and Microsoft say they have evidence that hackers backed by China are exploiting a zero-day bug in Microsoft SharePoint, as companies around the world scramble to patch the flaw.
The bug, known officially as CVE-2025-53770 and discovered last weekend, allows hackers to steal sensitive private keys from self-hosted versions of SharePoint, a software server widely used by companies and organizations to store and share internal documents. Once exploited, an attacker can use the bug to remotely plant malware and gain access to the files and data stored within, as well as gain access to other systems on the same network.
I have been dealing with this the last couple of days, Microsofts incompetence never fails to impress.
-
This is what you get when you don't patch your shit after being told about it MONTHS before it was demonstrated, and MONTHS after.
Even then this clearly effects US' federal government so all this talk of domestic security for bringing back businesses to US are quite laughable with this context.
-
Security researchers at Google and Microsoft say they have evidence that hackers backed by China are exploiting a zero-day bug in Microsoft SharePoint, as companies around the world scramble to patch the flaw.
The bug, known officially as CVE-2025-53770 and discovered last weekend, allows hackers to steal sensitive private keys from self-hosted versions of SharePoint, a software server widely used by companies and organizations to store and share internal documents. Once exploited, an attacker can use the bug to remotely plant malware and gain access to the files and data stored within, as well as gain access to other systems on the same network.
SharePoint is a nightmare.
-
Security researchers at Google and Microsoft say they have evidence that hackers backed by China are exploiting a zero-day bug in Microsoft SharePoint, as companies around the world scramble to patch the flaw.
The bug, known officially as CVE-2025-53770 and discovered last weekend, allows hackers to steal sensitive private keys from self-hosted versions of SharePoint, a software server widely used by companies and organizations to store and share internal documents. Once exploited, an attacker can use the bug to remotely plant malware and gain access to the files and data stored within, as well as gain access to other systems on the same network.
That’s not a zero-day… Really dislike media that waters down or misuse terminology
-
That’s not a zero-day… Really dislike media that waters down or misuse terminology
Well, it's a zero day for 24 hours, right?
-
Security researchers at Google and Microsoft say they have evidence that hackers backed by China are exploiting a zero-day bug in Microsoft SharePoint, as companies around the world scramble to patch the flaw.
The bug, known officially as CVE-2025-53770 and discovered last weekend, allows hackers to steal sensitive private keys from self-hosted versions of SharePoint, a software server widely used by companies and organizations to store and share internal documents. Once exploited, an attacker can use the bug to remotely plant malware and gain access to the files and data stored within, as well as gain access to other systems on the same network.
almost makes one forget this is a problem that Microsoft created.
-
Well, it's a zero day for 24 hours, right?
Yepp - it was, but that day was 11. June
-
Yepp - it was, but that day was 11. June
I don't think that's true either, based on the reporting it's based on a bug disclosed at a hacking conference in May. No clue how this is a zero day if it's based on a 2 month old bug reported to the vendor.
Seems more like bog standard Microsoft fucking around and waiting too long to patch before it got used.
-
I don't think that's true either, based on the reporting it's based on a bug disclosed at a hacking conference in May. No clue how this is a zero day if it's based on a 2 month old bug reported to the vendor.
Seems more like bog standard Microsoft fucking around and waiting too long to patch before it got used.
Iirc there was a previous attempt to patch this, it would appear a slight variation was not fixed in the patch. Might be why people are saying zero day.
-
That’s not a zero-day… Really dislike media that waters down or misuse terminology
It's not just media. The number of software engineers I've heard talk about "fixing" a "zero day" in a code dependency by updating to a patched version...
-
This is a zero-day bug though?
Read the article
-
Even then this clearly effects US' federal government so all this talk of domestic security for bringing back businesses to US are quite laughable with this context.
All what?
-
That’s not a zero-day… Really dislike media that waters down or misuse terminology
So that would make it a zero-oneandahalf-week.
-
almost makes one forget this is a problem that Microsoft created.
Well yes these type of things can happen to virtually any type of complex software to anyone. Though the lacking response is concerning.
-
This is a zero-day bug though?
It's not, the title lies.
-
AI Utopia, AI Apocalypse, and AI Reality: If we can’t build an equitable, sustainable society on our own, it’s pointless to hope that a machine that can’t think straight will do it for us.
Technology1
-
-
-
-
American attitudes about AI today mirror poll answers about the rise of the internet in the '90s
Technology1
-
-
‘I sold my iris; now what?’: What drives Brazilians to hand over their unique, personal data
Technology1
-