Audio By Carbonatix
A security patch released by Microsoft last month failed to fully fix a critical flaw in U.S. tech giant's SharePoint server software that had been identified in May, opening the door to a sweeping global cyber espionage operation.
It remains unclear who is behind the ongoing operation, which targeted around 100 organisations over the weekend. But Alphabet's Google, which has visibility into wide swathes of internet traffic, said it tied at least some of the hacks to a "China-nexus threat actor".
The Chinese Embassy in Washington did not respond to a Reuters request for comment. Chinese government-linked operatives are regularly implicated in cyberattacks, but Beijing routinely denies carrying out hacking operations.
Contacted on Tuesday, Microsoft was not immediately able to provide comment on the patch and its effectiveness.
The vulnerability that facilitated the attack was first identified in May at a hacking competition in Berlin organised by cybersecurity firm Trend Micro which offered cash bounties for the discovery of computer bugs in popular software.
It offered a $100,000 prize for "zero day" exploits - so called because they leverage previously undisclosed digital weaknesses - that could be used against SharePoint, Microsoft's flagship document management and collaboration platform.
A researcher working for the cybersecurity arm of Viettel, a telecommunications firm operated by Vietnam's military, identified, opens new tab a SharePoint bug at the event, dubbed it 'ToolShell' and demonstrated a method of exploiting it.
The researcher was awarded $100,000 for the discovery, according to a post, opens new tab on X by Trend Micro's "Zero Day Initiative". A spokesperson for Trend Micro did not immediately respond to Reuters' requests for comment regarding the competition on Tuesday.
Microsoft subsequently said in a July 8 security update that it had identified, opens new tab the bug, listed it as a critical vulnerability, and released patches to fix it.
Around 10 days later, however, cybersecurity firms started to notice an influx of malicious online activity targeting the same software the bug sought to exploit: SharePoint servers.
"Threat actors subsequently developed exploits that appear to bypass these patches," British cybersecurity firm Sophos said in a blog post, on Monday.
The pool of potential ToolShell targets remains vast.
According to data from Shodan, a search engine that helps to identify internet-linked equipment, over 8,000 servers online could theoretically have already been compromised by hackers.
The Shadowserver Foundation, which scans the internet for potential digital vulnerabilities, put the number at a little more than 9,000, while cautioning that the figure was a minimum.
Those servers include major industrial firms, banks, auditors, healthcare companies, and several U.S. state-level and international government entities.
Latest Stories
-
Sudan drone strikes kill nearly 700 in 3 months as civil war creates world’s largest humanitarian crisis
6 minutes -
ECG announces planned maintenance for April 16: See full list of affected areas
13 minutes -
Iran threatens to halt shipping in Gulf and Red Sea as US blockade of ports intensifies
13 minutes -
Luxury spending at NPRA puts pension security at risk — Minority
16 minutes -
Assafuah alleges NPRA Acting CEO doubled salary without board approval
19 minutes -
US and Iran expected to resume second round of peace talks in Pakistan next week
22 minutes -
Prempeh College hosts French WASSCE seminar for Ashanti Region students
23 minutes -
Secrecy in Publican AI customs deal sets dangerous precedent — Joseph Cudjoe
25 minutes -
World Athletics blocks Favour Ofili’s switch to Turkey
36 minutes -
Health Ministry begins validation of health professionals for recruitment and posting
44 minutes -
Turkish Police arrest 162 over online posts on deadly school shootings
1 hour -
TGMA announces fashion-focused red carpet theme for 2026 edition
1 hour -
AMA arrests Nigerian man for illegal waste dumping and extortion in Accra
1 hour -
Ghana Police warns of rising human trafficking through sports
1 hour -
SLTF starts disbursement for 2025/2026 No Academic Fees programme
2 hours