Close Menu
Finsider

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Tesla’s stock rises as investors embrace ambitious foray into making AI chips

    March 16, 2026

    March Fed Meeting: Live Updates and Commentary

    March 16, 2026

    What’s The Difference Between 120Hz And 144Hz TVs?

    March 16, 2026
    Facebook X (Twitter) Instagram
    Trending
    • Tesla’s stock rises as investors embrace ambitious foray into making AI chips
    • March Fed Meeting: Live Updates and Commentary
    • What’s The Difference Between 120Hz And 144Hz TVs?
    • 2 ridiculously cheap shares to consider buying now
    • Bernstein Remains Bullish on DraftKings (DKNG) Amid Strong Expansion Prospects
    • The billionaires made a promise — now some want out
    • 7 Steps to Accumulate $1 Million: A Guide
    • Do You Believe You Can’t Retire? You Need to Read This
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Finsider
    • Markets & Ecomony
    • Tech & Innovation
    • Money & Wealth
    • Business & Startups
    • Visa & Residency
    Finsider
    Home»Business & Startups»Hackers exploiting SharePoint zero-day seen targeting government agencies
    Business & Startups

    Hackers exploiting SharePoint zero-day seen targeting government agencies

    FinsiderBy FinsiderJuly 22, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    microsoft glitch
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The hackers behind the initial wave of attacks exploiting a zero-day in Microsoft SharePoint servers have so far primarily targeted government organizations, according to researchers and news reports.

    Over the weekend, U.S. cybersecurity agency CISA published an alert, warning that hackers were exploiting a previously unknown bug — known as a “zero-day” — in Microsoft’s enterprise data management product SharePoint. While it’s still too early to draw definitive conclusions, it appears that the hackers who first started abusing this flaw were targeting government organizations, according to Silas Cutler, the principal researcher at Censys, a cybersecurity firm that monitors hacking activities on the internet. 

    “It looks like initial exploitation was against a narrow set of targets,” Cutler told TechCrunch. “Likely government related.” 

    “This is a fairly rapidly evolving case. Initial exploitation of this vulnerability was likely fairly limited in terms of targeting, but as more attackers learn to replicate exploitation, we will likely see breaches as a result of this incident,” said Cutler.

    Contact Us

    Do you have more information about these SharePoint attacks? We’d love to hear from you. From a non-work device and network, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email.

    Now that the vulnerability is out there, and is still not fully patched by Microsoft, it’s possible other hackers that are not necessarily working for a government will join in and start abusing it, Cutler said.  

    Cutler added that he and his colleagues are seeing between 9,000 and 10,000 vulnerable SharePoint instances accessible from the internet, but that could change. Eye Security, which first published the existence of the bug, reported seeing a similar number, saying its researchers scanned more than 8,000 SharePoint servers worldwide and found evidence of dozens of compromised servers. 

    Given the limited number of targets and the types of targets at the beginning of the campaign, Cutler explained, it is likely that the hackers were part of a government group, commonly known as an advanced persistent threat.

    Techcrunch event

    San Francisco
    |
    October 27-29, 2025

    The Washington Post reported on Sunday that the attacks targeted U.S. federal and state agencies, as well as universities and energy companies, among other commercial targets. 

    Microsoft said in a blog post that the vulnerability only affects versions of SharePoint that are installed on local networks, and not the cloud versions, which means that each organization that deploys a SharePoint server needs to apply the patch or disconnect it from the internet.

    agencies exploiting Government Hackers SharePoint targeting zeroday
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWhy Splurging in Retirement is Totally Worth It
    Next Article NewPrinces ‘eyes October listing in London for Princes’
    Finsider
    • Website

    Related Posts

    Business & Startups

    Travis Kalanick reportedly starting a new self-driving company backed by Uber

    March 13, 2026
    Business & Startups

    Google is using old news reports and AI to predict flash floods

    March 12, 2026
    Business & Startups

    Slate Auto changes CEO months ahead of affordable EV launch

    March 9, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Cursor snaps up enterprise startup Koala in challenge to GitHub Copilot

    July 18, 2025

    What is Mistral AI? Everything to know about the OpenAI competitor

    July 18, 2025

    Analyst Report: Kinder Morgan Inc

    July 18, 2025
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Using Gen AI for Early-Stage Market Research

    July 18, 2025

    Cursor snaps up enterprise startup Koala in challenge to GitHub Copilot

    July 18, 2025

    What is Mistral AI? Everything to know about the OpenAI competitor

    July 18, 2025
    news

    Tesla’s stock rises as investors embrace ambitious foray into making AI chips

    March 16, 2026

    March Fed Meeting: Live Updates and Commentary

    March 16, 2026

    What’s The Difference Between 120Hz And 144Hz TVs?

    March 16, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2020 - 2026 The Finsider . Powered by LINC GLOBAL Inc.
    • Contact us
    • Guest Post Policy
    • Privacy Policy
    • Terms of Service

    Type above and press Enter to search. Press Esc to cancel.