Microsoft Knew of SharePoint Security Flaw but Failed to Effectively Patch It, Timeline Shows

It remains unclear who is behind the spy effort, which targeted about 100 organisations.

Advertisement
By Reuters | Updated: 23 July 2025 20:37 IST
Highlights
  • Microsoft said two Chinese hacking groups were exploiting the flaw
  • The vulnerability was first identified in May
  • Hackers could have already compromised more than 8,000 servers online

In a July 8 security update Microsoft said it had identified the bug

Photo Credit: Reuters

A security patch Microsoft released this month failed to fully fix a critical flaw in the US tech giant's SharePoint server software, opening the door to a sweeping global cyber espionage effort, a timeline reviewed by Reuters shows.

On Tuesday, a Microsoft spokesperson confirmed that its initial solution to the flaw, identified at a hacker competition in May, did not work, but added that it released further patches that resolved the issue.

Advertisement

It remains unclear who is behind the spy effort, which targeted about 100 organisations over the weekend, and is expected to spread as other hackers join the fray.

In a blog post Microsoft said two allegedly Chinese hacking groups, dubbed "Linen Typhoon" and "Violet Typhoon," were exploiting the weaknesses, along with a third, also based in China.

Advertisement

Microsoft and Alphabet's Google have said China-linked hackers were probably behind the first wave of hacks.

Chinese government-linked operatives are regularly implicated in cyberattacks, but Beijing routinely denies such hacking operations.

Advertisement

In an emailed statement, its embassy in Washington said China opposed all forms of cyberattacks, and "smearing others without solid evidence."

The vulnerability opening the way for the attack was first identified in May at a Berlin hacking competition organised by cybersecurity firm Trend Micro that offered cash bounties for finding computer bugs in popular software.

Advertisement

It offered a $100,000 prize for so-called "zero-day" exploits that leverage previously undisclosed digital weaknesses that could be used against SharePoint, Microsoft's flagship document management and collaboration platform.

The US National Nuclear Security Administration, charged with maintaining and designing the nation's cache of nuclear weapons, was among the agencies breached, Bloomberg News said on Tuesday, citing a person with knowledge of the matter.

No sensitive or classified information is known to have been compromised, it added.

The US Energy Department, the US Cybersecurity and Infrastructure Security Agency, and Microsoft did not immediately respond to Reuters' requests for comment on the report.

A researcher for the cybersecurity arm of Viettel, a telecoms firm run by Vietnam's military, identified a SharePoint bug at the May event, dubbed it "ToolShell" and demonstrated a way to exploit it.

The discovery won the researcher an award of $100,000, an X posting by Trend Micro's "Zero Day Initiative" showed.

Participating vendors were responsible for patching and disclosing security flaws in "an effective and timely manner," Trend Micro said in a statement.

"Patches will occasionally fail," it added. "This has happened with SharePoint in the past."

In a July 8 security update Microsoft said it had identified the bug, listed it as a critical vulnerability, and released patches to fix it.

About 10 days later, however, cybersecurity firms started to notice an influx of malicious online activity targeting the same software the bug sought to exploit: SharePoint servers.

"Threat actors subsequently developed exploits that appear to bypass these patches," British cybersecurity firm Sophos said in a blog post on Monday.

The pool of potential ToolShell targets remains vast.

Hackers could theoretically have already compromised more than 8,000 servers online, data from search engine Shodan, which helps identify internet-linked equipment, shows.

Such servers were in networks ranging from auditors, banks, healthcare companies and major industrial firms to U.S. state-level and international government bodies.

The Shadowserver Foundation, which scans the internet for potential digital vulnerabilities, put the number at a little more than 9,000, cautioning that the figure is a minimum.

It said most of those affected were in the United States and Germany.

Germany's federal office for information security, BSI, said on Tuesday it had found no compromised SharePoint servers in government networks, despite some being vulnerable to the ToolShell attack.

© Thomson Reuters 2025

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Honor Earbuds 4 With Up to 46 Hours of Total Battery Life Debut Globally
  2. Vivo Confirms Upcoming Phone With Massive 10,200mAh Battery
  3. Lava Bold N1 5G Is Now Available in a New 6GB RAM, 128GB Storage Variant
  4. OnePlus Nord CE 6 Key Features Revealed Ahead of Launch in India
  1. Assassin's Creed Black Flag Resynced Pricing Leaked Ahead of Official Reveal
  2. Honor Earbuds 4 Launched Globally With Active Noise Cancellation, Up to 46 Hours of Total Battery Life
  3. Motorola Razr 70 Ultra Design, Colour Options Spotted in Leaked Renders and Promotional Image
  4. UK’s FCA Raids Multiple Sites Suspected of Illegal P2P Crypto Operations
  5. Honor Win H7, Win H9 Launched With Up to Intel Core 9 Ultra HX CPU: Price, Specifications
  6. WhatsApp Launches Prepaid Mobile Recharges for Users in India: How to Recharge Your Mobile Number
  7. Samsung Details Switchable 2D/3D Display Technology That Could Come to Future Galaxy Phones
  8. Crimson Desert Gets Difficulty Settings, Graphical Upgrades and Inventory Improvements in Latest Patch
  9. Spider-Noir OTT Release Date: When and Where to Watch Nicolas Cage Starrer
  10. Alpha: Men Love Vengeance OTT Release, Cast, Plot & Where to Watch on Amazon Prime Video
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.