Tech & Science

U.S. and German Agencies Among Victims in Major Microsoft Server Breach

27
Microsoft

A large-scale cyberattack exploiting a critical flaw in Microsoft’s SharePoint server software has compromised around 100 organizations globally, according to cybersecurity researchers.

The hack, which began before the weekend, targeted self-hosted versions of SharePoint—Microsoft’s widely-used document sharing and collaboration platform.

Microsoft confirmed the attacks on Saturday and urged customers to install available security updates immediately. Cloud-based SharePoint systems hosted by Microsoft were not affected.

The attack is being classified as a “zero-day” exploit, meaning it was carried out using a previously unknown software vulnerability. Experts say hackers used this flaw to gain unauthorized access and potentially plant backdoors, allowing long-term control over infected systems.

The Netherlands-based cybersecurity firm Eye Security was one of the first to detect the breach. Its chief hacker, Vaisha Bernard, said that scans conducted with the Shadowserver Foundation revealed at least 100 affected organizations—mainly in the United States and Germany—including government bodies. The full extent of the compromise could grow as more systems are examined.

“It’s unambiguous,” Bernard said, warning that other hackers may have already taken advantage of the same flaw. A Shadowserver spokesperson added that the number of vulnerable servers online could exceed 9,000 globally.

The U.S. Federal Bureau of Investigation (FBI) said it is aware of the situation and working closely with public and private sector partners. Britain’s National Cyber Security Centre also acknowledged a limited number of targets in the UK.

While Microsoft did not name the hackers involved, Google’s threat analysis team linked some of the activity to a China-based group. The Chinese Embassy in Washington has not responded, but Beijing typically denies involvement in cyber espionage.

Cybersecurity experts warn that even with patches in place, affected organizations must take further steps to fully secure their systems. “Just applying the patch isn’t all that is required,” said Daniel Card of UK-based PwnDefend, noting the potential scale of the compromise.

Thousands of entities—including banks, healthcare providers, industrial firms, and government agencies—could still be at risk if they have not yet updated or investigated their systems.

Written by
Sazid Kabir

I've loved music and writing all my life. That's why I started this blog. In my spare time, I make music and run this blog for fellow music fans.

Stay updated with nomusica.com. Add us to your preferred sources to see our latest updates first.

Related Articles

Artificial Intelligence — AI
AITech & Science

AI Floods Research Papers, Scientists Call for Stricter Disclosure

Scientists are raising alarms over a surge of low-quality AI-generated research papers,...

Nvidia CEO Jensen Huang at CES 2025
Finance & BusinessTech & Science

Nvidia Pulls Back on $100B OpenAI Investment, Confirms Smaller, Measured Support

Nvidia CEO Jensen Huang has clarified that the previously reported $100 billion...

ChatGPT 5
AITech & Science

ChatGPT Ads Could Reshape Digital Marketing for Businesses Everywhere

OpenAI’s introduction of ads in ChatGPT is changing how digital marketing works....

Kimi K1.5
AITech & Science

Chinese AI Models Close the Gap With OpenAI and Google

Chinese technology companies are speeding up the release of new artificial intelligence...