Microsoft SharePoint Hack: Investigations on whether Chinese hackers have received flaws through alert

by SkillAiNest

According to those familiar with the matter, the Microsoft Corporation is investigating whether a leakage from its initial alert system for cybercularity companies has been allowed to exploit the flaws in its share point service, according to the matter.

People have developed an opportunity to fix the computer system before disclosing security concerns to see if the program is watching the program that has led to widespread exploitation of its share point software globally in the past several days.

“As part of our standard process, we will review the incident, find areas to improve, and apply these improvements extensively,” a Microsoft spokesman said in a statement.

The Chinese Embassy in Washington cited comments made by Foreign Ministry spokesman Go Jiacone earlier this week, which opposed hacking activities. “CyberScureity is a common challenge facing all countries and it should be resolved jointly through dialogue and cooperation,” said Go. At the same time, we oppose corruption and attacks against China in the pretext of cyberself.

According to the Microsoft website, Microsoft has attributed the sharedpoint violations to state -sponsored hackers from China, and at least a dozen Chinese companies by the Microsoft Activist Protection Program, or MAPP, participate in the move. Members of the 17 -year -old program will have to prove that they are cyberciction vendors and that they do not produce hacking tools like penetration testing software. After signing the non -Information Agreement, they seek information about the patch of the novel 24 hours before the issuance of Microsoft to the public.

According to Microsoft’s MAPP website, sub -sets of more and more users receive patch reports five days ago.

Dustin Childs, head of the risk awareness for Zero Day Initiative at the CyberScureti company Trend Micro, says Microsoft informed members of the program about the dangers that led to the sharing attacks. Childs say “both of these insects were involved in the release of MAPP,” whose company is a MAPP member. “The possibility of leakage has definitely crossed our minds.” He added that such leakage would be a serious threat to the program, “Although I still think the map is very important.”

The victims of the attacks are now more than 400 government agencies and corporations worldwide, including the US National Nuclear Security Administration, which is the division responsible for designing and maintaining the country’s nuclear weapons. For at least some attacks, Microsoft has blamed Linn Typhone and Violet Typhone, calling the Chinese government -organized groups as well as another group based in China. In response to the allegations, the Chinese Embassy has said that it opposes all kinds of cybertics, while also objecting to “to smell others without solid evidence.”

Dinah Ho Anh Khowa, a researcher working for the Vietnamese CyberScureti firm Vitel, revealed that the SharePoint had unknown threats at a conference in Berlin, organized by the Child’s Organization, where hackers were sitting on the stage in front of the audience and looking for security. The children said that after a public demonstration and celebration, the lost went to a private room with children and Microsoft representatives. Khova explained in detail the exploitation and handed over a complete white paper. Microsoft confirmed the research and immediately. He started working on a fix. Khoha won 000 100,000 for this work.

It took Microsoft about 60 days to come with a fix. Researchers at CyberScureti said that on July 7, a day before a patch was publicly released, hackers attacked SharePoint servers.

Children say it is possible that the hackers found the insect freely and began to exploit them the same day that Microsoft shared them with the map members. But he added that it would be an incredible consensus. The second obvious possibility is that someone shared information with the attackers.

The removal of the pending patch will be quite a failure in security, but “it has happened before,” said Jim Walter, a senior threat to the cyber firm Sentinelon.

The Map has been a source of alleged leakage until 2012, when Microsoft has accused the Chinese Network Security Company, Hangzhou DPT Technologies Company, to disclose information that expose a major weakness in Windows. The Hangzhou Dutch was removed from the map group. At that time, a Microsoft representative said in a statement that it “has strengthened the current control and has taken steps to better protect our information.”

In 2021, Microsoft suspected at least two other Chinese map partners in its exchange servers of leaking information about the risks in their exchange servers, accusing Microsoft of a Chinese spy group called Hafnium. It was one of the worst violations of the company so far.

Bloomberg first reported that after the 2021 incident, the company considered reviewing the MAPP program. But he did not reveal whether some changes were eventually made or a leak was discovered.

A Chinese law of 2021 orders that any company or security researcher, which indicates security threat, according to a report by the Atlantic Council, will have to report the government’s ministry and information technology within 48 hours. According to Chinese official websites, some Chinese companies that are included in the MAPP, such as Beijing Cyberconlin Technology Company Limited, are also members of the Chinese government’s risks, also members of the China National Laminability Database, which, according to Chinese official websites, operates through the country’s state security.

Etogenio Bennakasa, a researcher at the ETH Zuric Center for Security Studies, says there is a lack of transparency on how Chinese companies balance their promises to protect the risks shared by Microsoft with their promises that they share with the Chinese government. “We know that some of these companies cooperate with state security agencies, and that the risky management system is extremely central,” says Bannusa. “This is definitely an area that is close to checking.”

25 2025 Bloomberg LP

You may also like

Leave a Comment

At Skillainest, we believe the future belongs to those who embrace AI, upgrade their skills, and stay ahead of the curve.

Get latest news

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

@2025 Skillainest.Designed and Developed by Pro