
6:32 AM PDT · July 23, 2025
Security researchers opportunity hackers person breached astatine slightest 400 organizations by exploiting a zero-day vulnerability successful Microsoft SharePoint, signalling a crisp emergence successful nan number of detected compromises since nan bug was discovered past week.
Eye Security, a Dutch cybersecurity patient that first identified nan vulnerability successful SharePoint, a celebrated server package that companies usage to shop and stock soul documents, said it had identified hundreds of affected SharePoint servers by scanning nan internet. The number has risen from nan dozens of known compromised servers arsenic of earlier this week.
Bloomberg reports that 1 of nan affected organizations includes nan National Nuclear Security Administration (NNSA), nan national agency responsible for maintaining and processing nan U.S. stockpile of atomic weapons. A spokesperson for nan Department of Energy, which houses nan NNSA, did not respond to TechCrunch’s petition for comment.
Several other authorities departments and agencies were besides compromised successful an early activity of attacks exploiting nan SharePoint bug, researchers confirmed. Data suggests hackers were exploiting nan vulnerability arsenic early arsenic July 7.
The bug, officially known arsenic CVE-2025-53770, affects self-hosted versions of SharePoint that companies group up and negociate connected their ain servers. Once exploited, nan bug allows an attacker to remotely tally malicious codification connected nan affected server, permitting entree to nan files stored inside, arsenic good arsenic different systems connected nan company’s wider network.
The vulnerability is known arsenic a zero-day because Microsoft had nary clip to merchandise patches earlier it was exploited. Microsoft has since released patches for each affected SharePoint versions.
Google and Microsoft opportunity they person grounds that several China-backed hacking groups are exploiting nan bug, but warned companies to expect an uptick successful compromises arsenic much hacker groups activity to return advantage of nan vulnerability. The Chinese authorities denied nan allegations.
Techcrunch event
San Francisco | October 27-29, 2025
Zack Whittaker is nan information editor astatine TechCrunch. He tin beryllium reached via encrypted connection astatine zackwhittaker.1337 connected Signal, aliases by email astatine zack.whittaker@techcrunch.com.