Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing

New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing

Posted on September 5, 2025September 5, 2025 By CWS

A current investigation has revealed that Microsoft employed China-based engineers to keep up and help SharePoint software program, the identical collaboration platform that was not too long ago compromised by Chinese language state-sponsored hackers.

This revelation raises important issues about cybersecurity practices and potential insider threats inside essential infrastructure programs utilized by lots of of presidency companies and personal corporations.

The cybersecurity incident, which Microsoft disclosed final month, concerned subtle assaults on SharePoint “OnPrem” installations starting as early as July 7, 2025.

Chinese language hackers efficiently exploited vulnerabilities within the on-premises model of SharePoint, gaining unauthorized entry to laptop programs throughout a number of high-profile targets, together with the Nationwide Nuclear Safety Administration and the Division of Homeland Safety.

The assault demonstrated superior persistent menace capabilities, with hackers sustaining entry even after Microsoft’s preliminary safety patch on July 8.

ProPublica analysts recognized the regarding operational construction by inner Microsoft work-tracking system screenshots, revealing that China-based engineering groups had been chargeable for SharePoint upkeep and bug fixes for a number of years.

This discovery provides a troubling dimension to the safety breach, as the identical personnel tasked with sustaining the software program’s integrity could have inadvertently created vulnerabilities that adversaries may exploit.

The technical scope of the vulnerability was intensive, with the U.S. Cybersecurity and Infrastructure Safety Company confirming that the exploits enabled attackers to “totally entry SharePoint content material, together with file programs and inner configurations, and execute code over the community.”

The assault vector allowed for distant code execution, successfully granting hackers administrative privileges over compromised programs.

Persistence and Evasion Mechanisms

The SharePoint exploit demonstrated subtle persistence techniques that allowed attackers to keep up entry even after preliminary remediation efforts.

When Microsoft launched the primary safety patch on July 8, the menace actors shortly tailored their strategies to bypass the brand new protections, forcing the corporate to develop further “extra strong protections” in subsequent patches.

The persistence mechanism doubtless concerned embedding malicious code inside SharePoint’s configuration recordsdata and leveraging the platform’s intensive file system entry capabilities.

Attackers may set up backdoors by modifying authentication modules or creating hidden administrative accounts throughout the SharePoint infrastructure. This method enabled sustained entry to delicate authorities and company knowledge whereas remaining undetected by customary safety monitoring instruments.

Microsoft has acknowledged the safety implications and introduced plans to relocate China-based help operations to various places.

The corporate emphasised that each one work was performed underneath U.S.-based supervision with necessary safety critiques, although consultants query whether or not such oversight measures adequately mitigate the inherent dangers of overseas personnel dealing with delicate system upkeep.

Enhance your SOC and assist your crew shield your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Bug, ChinaBased, Claims, Engineers, Fixing, Microsoft, Report, SharePoint, Support

Post navigation

Previous Post: 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025
Next Post: How to Use Disposable Email Addresses

Related Posts

Preventing Phishing Attacks on Cryptocurrency Exchanges Preventing Phishing Attacks on Cryptocurrency Exchanges Cyber Security News
CrowdStrike Warns of New Mass Exploitation Campaign Leveraging Oracle E-Business Suite 0-Day CrowdStrike Warns of New Mass Exploitation Campaign Leveraging Oracle E-Business Suite 0-Day Cyber Security News
Microsoft Fixes Windows 11 24H2 Audio Issue that Stops Bluetooth Headsets and Speakers Working Microsoft Fixes Windows 11 24H2 Audio Issue that Stops Bluetooth Headsets and Speakers Working Cyber Security News
Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code Cyber Security News
Hackers are Weaponizing Invoices to Deliver XWorm That Steals Login Credentials Hackers are Weaponizing Invoices to Deliver XWorm That Steals Login Credentials Cyber Security News
Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark