In July 2025, Microsoft issued a critical alert regarding active cyberattacks targeting SharePoint servers used by businesses and government agencies for internal document sharing. These attacks exploit a previously unknown "zero-day" vulnerability, leaving tens of thousands of servers potentially at risk. (reuters.com)
The cyberattacks focus on on-premises SharePoint servers, exploiting a vulnerability that allows attackers to perform spoofing over a network. This type of attack enables malicious actors to impersonate trusted entities, potentially leading to unauthorized access and data breaches. Notably, SharePoint Online, part of Microsoft 365's cloud services, remains unaffected by this vulnerability. (reuters.com)
The attack is characterized as a "zero-day" exploit, meaning it targets a vulnerability that was previously unknown to Microsoft and the cybersecurity community. Such exploits are particularly dangerous because they leave systems vulnerable until a patch is developed and deployed. (reuters.com)
A Microsoft spokesperson stated, "We've been coordinating closely with CISA, DOD Cyber Defense Command, and key cybersecurity partners globally throughout our response." This collaboration underscores the severity of the situation and the importance of a unified response to mitigate the threat. (reuters.com)
As investigations continue, it is crucial for all organizations utilizing SharePoint servers to stay informed through official channels and adhere to the recommended security practices to safeguard their systems and sensitive data.
Source: Business Post Microsoft alerts businesses, governments to server software attack
Nature of the Attack
The cyberattacks focus on on-premises SharePoint servers, exploiting a vulnerability that allows attackers to perform spoofing over a network. This type of attack enables malicious actors to impersonate trusted entities, potentially leading to unauthorized access and data breaches. Notably, SharePoint Online, part of Microsoft 365's cloud services, remains unaffected by this vulnerability. (reuters.com)Scope and Impact
Initial reports indicated that approximately 100 organizations were compromised. However, subsequent investigations by Netherlands-based Eye Security revealed that the number of affected organizations had risen to about 400. The firm cautioned that this figure is likely an undercount, suggesting a more extensive impact across various sectors. (reuters.com)The attack is characterized as a "zero-day" exploit, meaning it targets a vulnerability that was previously unknown to Microsoft and the cybersecurity community. Such exploits are particularly dangerous because they leave systems vulnerable until a patch is developed and deployed. (reuters.com)
Microsoft's Response
In response to the attacks, Microsoft has released security updates for the SharePoint Subscription Edition and is working on updates for the 2016 and 2019 versions. The company strongly urges customers to apply these updates immediately. For organizations unable to implement the recommended malware protection, Microsoft advises disconnecting affected servers from the internet until the security updates can be applied. (reuters.com)A Microsoft spokesperson stated, "We've been coordinating closely with CISA, DOD Cyber Defense Command, and key cybersecurity partners globally throughout our response." This collaboration underscores the severity of the situation and the importance of a unified response to mitigate the threat. (reuters.com)
Investigations and Attribution
The FBI has acknowledged awareness of the attacks and is working closely with federal and private-sector partners to investigate the incidents. While the specific perpetrators have not been identified, cybersecurity experts suggest that the consistency of the attack methods indicates the work of a single actor. However, they caution that this could change rapidly as more information becomes available. (reuters.com)Recommendations for Organizations
Given the widespread nature of the attacks and the critical role of SharePoint servers in organizational operations, it is imperative for businesses and government agencies to take immediate action:- Apply Security Updates: Install the security patches provided by Microsoft without delay to close the vulnerability.
- Monitor Systems: Review server logs for any signs of unauthorized access or unusual activity.
- Implement Network Segmentation: Isolate critical systems to prevent lateral movement by attackers within the network.
- Enhance Authentication Measures: Enforce multi-factor authentication to add an additional layer of security.
- Develop Incident Response Plans: Prepare and regularly update response strategies to address potential breaches promptly.
Broader Implications
This incident highlights the persistent and evolving nature of cyber threats targeting critical infrastructure. Organizations must remain vigilant, continuously updating and monitoring their systems to defend against such sophisticated attacks. The collaboration between Microsoft, government agencies, and cybersecurity partners serves as a model for addressing and mitigating large-scale cyber threats.As investigations continue, it is crucial for all organizations utilizing SharePoint servers to stay informed through official channels and adhere to the recommended security practices to safeguard their systems and sensitive data.
Source: Business Post Microsoft alerts businesses, governments to server software attack