Chinese state-sponsored hackers are actively exploiting critical security vulnerabilities in users of Microsoft’s popular SharePoint servers to steal sensitive data and deploy malicious code, the US tech giant warned Tuesday.

Microsoft headquarters in Redmond, Washington.
Microsoft headquarters in Redmond, Washington. File photo: Microsoft.

Microsoft said it has observed three threat groups –- dubbed Linen Typhoon, Violet Typhoon, and Storm-2603 –- targeting internet-facing SharePoint servers using two newly disclosed vulnerabilities that allow attackers to bypass authentication and execute remote code.

SharePoint Server is Microsoft’s collaboration and document management platform designed for businesses and organizations.

Many large organizations use SharePoint as their primary platform for internal collaboration and for storing documents, and is appreciated for working well with other Microsoft products like Office, Teams, and Outlook.

The attacks, which Microsoft said began as early as July 7, affect only on-premises SharePoint installations and do not impact the cloud-based SharePoint Online service, the company said in a security bulletin.

Microsoft warned that it “assesses with high confidence” that the threat actors will continue their assault against vulnerable systems where companies haven’t taken the necessary precautions.

The vulnerabilities allow attackers to spoof authentication credentials and execute malicious code remotely on vulnerable servers.

Microsoft has released comprehensive security updates to address the malware and urged customers to apply the patches immediately.

See also: US slaps sanctions on Beijing-based hacking group with ties to Chinese gov’t

In their successful attacks, the Chinese hackers deployed malicious code that provides backdoor access to compromised systems. The attackers used these tools to steal machine encryption keys and maintain access to targeted networks.

Linen Typhoon, active since 2012, primarily focuses on intellectual property theft from government, defense, and human rights organizations.

Violet Typhoon, operating since 2015, conducts espionage against former government officials, NGOs, think tanks, and media organizations across the United States, Europe, and East Asia.

Storm-2603, which Microsoft assesses with “medium confidence” to be China-based, has previously deployed ransomware but its current objectives remain unclear.

Research from cybersecurity company Check Point said the campaign began on July 7 against a major Western government and that the attacks intensified dramatically around July 18.

Since then, researchers have confirmed dozens of compromise attempts primarily targeting organizations in North America and Western Europe, Check Point said in a blog post.

Support HKFP  |  Policies & Ethics  |  Error/typo?  |  Contact Us  |  Newsletter  | Transparency & Annual Report | Apps

Safeguard press freedom; keep HKFP free for all readers by supporting our team

HK$
HK$

Members of HK$150/month unlock 8 benefits: An HKFP deer keyring or tote; exclusive Tim Hamlett columns; feature previews; merch drops/discounts; "behind the scenes" insights; a chance to join newsroom Q&As, early access to our Annual/Transparency Report & all third-party banner ads disabled.

Dateline:

San Francisco, United States

Type of Story: News Service

Produced externally by an organization we trust to adhere to high journalistic standards.

The Trust Project HKFP
Journalist Trust Initiative HKFP
Society of Publishers in Asia
International Press Institute
Oxfam Living Wage Employer
Google Play hkfp
hkfp app Apple
hkfp payment methods
YouTube video
YouTube video

Agence France-Press (AFP) is "a leading global news agency providing fast, comprehensive and verified coverage of the events shaping our world and of the issues affecting our daily lives." HKFP relies on AFP, and its international bureaus, to cover topics we cannot. Read their Ethics Code here