News of the hack did not impact the tech giant’s stock [File: Jason Redmond/AP Photo] |
Global Alert: Zero-Day Exploit Targets Microsoft SharePoint Servers, Compromising 100+ Organizations
WASHINGTON D.C. – July 23, 2025 – A widespread cyber espionage operation exploiting a previously unknown vulnerability in Microsoft's self-hosted SharePoint server software has compromised at least 100 organizations globally over the past weekend.
The "Zero-Day" Threat: Unveiling CVE-2025-53770
On Saturday, Microsoft issued an alert confirming "active attacks" on on-premises SharePoint servers, which are widely used for internal document sharing and collaboration.
The vulnerability, now identified as CVE-2025-53770, is a "zero-day" exploit, meaning it leverages a digital weakness previously undisclosed to Microsoft and the wider cybersecurity community.
Scale of Compromise and Affected Regions
Vaisha Bernard, Chief Hacker at Eye Security, a Netherlands-based cybersecurity firm that first detected the campaign targeting one of its clients on Friday, confirmed the widespread impact.
The Shadowserver Foundation corroborated the figure, noting that the majority of affected organizations are located in the United States and Germany, with government entities among the victims.
Microsoft's Response and Urgent Recommendations
A Microsoft spokesperson stated that the company has "provided security updates and encourages customers to install them."
Cybersecurity experts, including Daniel Card of British consultancy PwnDefend, strongly advise an "assumed breach approach."
Immediately apply all available security updates.
Enable Antimalware Scan Interface (AMSI) integration and deploy robust antivirus solutions like Defender AV on all SharePoint servers.
15 Rotate server security keys after patching to invalidate any stolen credentials.
16 Monitor for suspicious files (e.g.,
spinstall0.aspx
) and unusual process chains originating from the IIS worker process (e.g.,w3wp.exe ➝ cmd.exe ➝ powershell.exe -EncodedCommand
).17 If immediate patching is not possible, disconnect vulnerable SharePoint servers from the internet.
18
Who is Behind the Attack?
The identity of the perpetrators behind this ongoing cyberattack remains unconfirmed. The FBI acknowledged awareness of the attacks on Sunday, stating they are working with federal and private-sector partners but offered no further details.
Vast Attack Surface and Broader Implications
The potential pool of targets remains immense. Data from Shodan, an internet-connected device search engine, indicates over 8,000 online servers could still be vulnerable. These encompass a wide range of sectors, including major industrial firms, banks, auditors, healthcare companies, and various US state-level and international government entities.
"The SharePoint incident appears to have created a broad level of compromise across a range of servers globally," noted Daniel Card.
Microsoft's stock, despite the cyber incident, saw a modest increase of 0.06 percent by 3 PM ET, indicating that investors may be confident in the company's ability to manage the fallout. However, the true impact on victim organizations and the long-term implications for global cybersecurity remain to be fully assessed.