Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing

New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing

Posted on September 5, 2025September 5, 2025 By CWS

A current investigation has revealed that Microsoft employed China-based engineers to keep up and help SharePoint software program, the identical collaboration platform that was not too long ago compromised by Chinese language state-sponsored hackers.

This revelation raises important issues about cybersecurity practices and potential insider threats inside essential infrastructure programs utilized by lots of of presidency companies and personal corporations.

The cybersecurity incident, which Microsoft disclosed final month, concerned subtle assaults on SharePoint “OnPrem” installations starting as early as July 7, 2025.

Chinese language hackers efficiently exploited vulnerabilities within the on-premises model of SharePoint, gaining unauthorized entry to laptop programs throughout a number of high-profile targets, together with the Nationwide Nuclear Safety Administration and the Division of Homeland Safety.

The assault demonstrated superior persistent menace capabilities, with hackers sustaining entry even after Microsoft’s preliminary safety patch on July 8.

ProPublica analysts recognized the regarding operational construction by inner Microsoft work-tracking system screenshots, revealing that China-based engineering groups had been chargeable for SharePoint upkeep and bug fixes for a number of years.

This discovery provides a troubling dimension to the safety breach, as the identical personnel tasked with sustaining the software program’s integrity could have inadvertently created vulnerabilities that adversaries may exploit.

The technical scope of the vulnerability was intensive, with the U.S. Cybersecurity and Infrastructure Safety Company confirming that the exploits enabled attackers to “totally entry SharePoint content material, together with file programs and inner configurations, and execute code over the community.”

The assault vector allowed for distant code execution, successfully granting hackers administrative privileges over compromised programs.

Persistence and Evasion Mechanisms

The SharePoint exploit demonstrated subtle persistence techniques that allowed attackers to keep up entry even after preliminary remediation efforts.

When Microsoft launched the primary safety patch on July 8, the menace actors shortly tailored their strategies to bypass the brand new protections, forcing the corporate to develop further “extra strong protections” in subsequent patches.

The persistence mechanism doubtless concerned embedding malicious code inside SharePoint’s configuration recordsdata and leveraging the platform’s intensive file system entry capabilities.

Attackers may set up backdoors by modifying authentication modules or creating hidden administrative accounts throughout the SharePoint infrastructure. This method enabled sustained entry to delicate authorities and company knowledge whereas remaining undetected by customary safety monitoring instruments.

Microsoft has acknowledged the safety implications and introduced plans to relocate China-based help operations to various places.

The corporate emphasised that each one work was performed underneath U.S.-based supervision with necessary safety critiques, although consultants query whether or not such oversight measures adequately mitigate the inherent dangers of overseas personnel dealing with delicate system upkeep.

Enhance your SOC and assist your crew shield your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Bug, ChinaBased, Claims, Engineers, Fixing, Microsoft, Report, SharePoint, Support

Post navigation

Previous Post: 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025
Next Post: How to Use Disposable Email Addresses

Related Posts

Chrome V8 JavaScript Engine Vulnerability Let Attackers Execute Remote Code Chrome V8 JavaScript Engine Vulnerability Let Attackers Execute Remote Code Cyber Security News
BlobPhish Exploits Microsoft 365 with New Tactics BlobPhish Exploits Microsoft 365 with New Tactics Cyber Security News
Automating Patch Management Reducing Vulnerabilities at Scale Automating Patch Management Reducing Vulnerabilities at Scale Cyber Security News
Sedgwick confirms Data Breach Following TridentLocker Ransomware Gang Claim Sedgwick confirms Data Breach Following TridentLocker Ransomware Gang Claim Cyber Security News
Fake CAPTCHA Attack Leverages Microsoft Application Virtualization (App-V) to Deploy Malware Fake CAPTCHA Attack Leverages Microsoft Application Virtualization (App-V) to Deploy Malware Cyber Security News
ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark