Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing

Posted on September 5, 2025September 5, 2025 By CWS

A current investigation has revealed that Microsoft employed China-based engineers to keep up and help SharePoint software program, the identical collaboration platform that was not too long ago compromised by Chinese language state-sponsored hackers.

This revelation raises important issues about cybersecurity practices and potential insider threats inside essential infrastructure programs utilized by lots of of presidency companies and personal corporations.

The cybersecurity incident, which Microsoft disclosed final month, concerned subtle assaults on SharePoint “OnPrem” installations starting as early as July 7, 2025.

Chinese language hackers efficiently exploited vulnerabilities within the on-premises model of SharePoint, gaining unauthorized entry to laptop programs throughout a number of high-profile targets, together with the Nationwide Nuclear Safety Administration and the Division of Homeland Safety.

The assault demonstrated superior persistent menace capabilities, with hackers sustaining entry even after Microsoft’s preliminary safety patch on July 8.

ProPublica analysts recognized the regarding operational construction by inner Microsoft work-tracking system screenshots, revealing that China-based engineering groups had been chargeable for SharePoint upkeep and bug fixes for a number of years.

This discovery provides a troubling dimension to the safety breach, as the identical personnel tasked with sustaining the software program’s integrity could have inadvertently created vulnerabilities that adversaries may exploit.

The technical scope of the vulnerability was intensive, with the U.S. Cybersecurity and Infrastructure Safety Company confirming that the exploits enabled attackers to “totally entry SharePoint content material, together with file programs and inner configurations, and execute code over the community.”

The assault vector allowed for distant code execution, successfully granting hackers administrative privileges over compromised programs.

Persistence and Evasion Mechanisms

The SharePoint exploit demonstrated subtle persistence techniques that allowed attackers to keep up entry even after preliminary remediation efforts.

When Microsoft launched the primary safety patch on July 8, the menace actors shortly tailored their strategies to bypass the brand new protections, forcing the corporate to develop further “extra strong protections” in subsequent patches.

The persistence mechanism doubtless concerned embedding malicious code inside SharePoint’s configuration recordsdata and leveraging the platform’s intensive file system entry capabilities.

Attackers may set up backdoors by modifying authentication modules or creating hidden administrative accounts throughout the SharePoint infrastructure. This method enabled sustained entry to delicate authorities and company knowledge whereas remaining undetected by customary safety monitoring instruments.

Microsoft has acknowledged the safety implications and introduced plans to relocate China-based help operations to various places.

The corporate emphasised that each one work was performed underneath U.S.-based supervision with necessary safety critiques, although consultants query whether or not such oversight measures adequately mitigate the inherent dangers of overseas personnel dealing with delicate system upkeep.

Enhance your SOC and assist your crew shield your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Bug, ChinaBased, Claims, Engineers, Fixing, Microsoft, Report, SharePoint, Support

Post navigation

Previous Post: 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025
Next Post: How to Use Disposable Email Addresses

Related Posts

DeerStealer Malware Delivered Via Weaponized .LNK Using LOLBin Tools Cyber Security News
Ransomware Operations Surge Following Qilin’s New Pattern of Attacks Cyber Security News
UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device Cyber Security News
Lumma Infostealers Developers Trying Hard To Conduct Business As Usual Cyber Security News
North Korean Kimsuky Hackers Data Breach Cyber Security News
Achieving Continuous Compliance in Dynamic Threat Environments Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing
  • 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025
  • SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month
  • Threats Actors Weaponize ScreenConnect Installers to Gain Initial Access to Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing
  • 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025
  • SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month
  • Threats Actors Weaponize ScreenConnect Installers to Gain Initial Access to Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News