Audio By Carbonatix
A security patch released by Microsoft last month failed to fully fix a critical flaw in U.S. tech giant's SharePoint server software that had been identified in May, opening the door to a sweeping global cyber espionage operation.
It remains unclear who is behind the ongoing operation, which targeted around 100 organisations over the weekend. But Alphabet's Google, which has visibility into wide swathes of internet traffic, said it tied at least some of the hacks to a "China-nexus threat actor".
The Chinese Embassy in Washington did not respond to a Reuters request for comment. Chinese government-linked operatives are regularly implicated in cyberattacks, but Beijing routinely denies carrying out hacking operations.
Contacted on Tuesday, Microsoft was not immediately able to provide comment on the patch and its effectiveness.
The vulnerability that facilitated the attack was first identified in May at a hacking competition in Berlin organised by cybersecurity firm Trend Micro which offered cash bounties for the discovery of computer bugs in popular software.
It offered a $100,000 prize for "zero day" exploits - so called because they leverage previously undisclosed digital weaknesses - that could be used against SharePoint, Microsoft's flagship document management and collaboration platform.
A researcher working for the cybersecurity arm of Viettel, a telecommunications firm operated by Vietnam's military, identified, opens new tab a SharePoint bug at the event, dubbed it 'ToolShell' and demonstrated a method of exploiting it.
The researcher was awarded $100,000 for the discovery, according to a post, opens new tab on X by Trend Micro's "Zero Day Initiative". A spokesperson for Trend Micro did not immediately respond to Reuters' requests for comment regarding the competition on Tuesday.
Microsoft subsequently said in a July 8 security update that it had identified, opens new tab the bug, listed it as a critical vulnerability, and released patches to fix it.
Around 10 days later, however, cybersecurity firms started to notice an influx of malicious online activity targeting the same software the bug sought to exploit: SharePoint servers.
"Threat actors subsequently developed exploits that appear to bypass these patches," British cybersecurity firm Sophos said in a blog post, on Monday.
The pool of potential ToolShell targets remains vast.
According to data from Shodan, a search engine that helps to identify internet-linked equipment, over 8,000 servers online could theoretically have already been compromised by hackers.
The Shadowserver Foundation, which scans the internet for potential digital vulnerabilities, put the number at a little more than 9,000, while cautioning that the figure was a minimum.
Those servers include major industrial firms, banks, auditors, healthcare companies, and several U.S. state-level and international government entities.
Latest Stories
-
Vice President commends foreign Ministry for strong UN diplomacy, AfCFTA push
8 minutes -
Time vindicates the Just: Haruna Iddrisu’s position on Special Prosecutor powers upheld by High Court
25 minutes -
PRESEC does it again: Kekeli Afudego crowned Ghana’s top high school Mathematician for 2026
44 minutes -
Government deepens responsible mining drive with MDF–GGSA partnership
1 hour -
Some OMCs begin fuel price cuts as GOIL, Star Oil adjust prices in line with NPA floor
1 hour -
ActionAid, partners launch ARCCLG Project to eradicate child labour in Ghana’s cocoa belt
1 hour -
President Mahama arrives in Congo for Sassou N’Guesso’s investiture ceremony
1 hour -
Cedi posts best quarter 1 in half-decade
1 hour -
Today’s Front pages: Thursday, April 16, 2026
1 hour -
Sports journalists urged to be vigilant as human trafficking rises
1 hour -
Kufuor backs African-led economic forum, urges push for self-reliance
1 hour -
Ziavi chieftaincy dispute deepens as rival factions install paramount chiefs
2 hours -
Dr Bawumia and NPP will make sure we win the confidence of Ghanaians – Abu Jinapor
2 hours -
Government, private sector back UNHCR agribusiness drive to boost refugee livelihoods
2 hours -
The Prosecutor who could not prosecute (A Ghanaian Folktale from the Republic of Uncommon Sense)
3 hours