TechCrunch - HealthTech 07月23日 21:32
Hundreds of organizations breached by SharePoint mass-hacks
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

安全研究人员发现,微软SharePoint软件存在一个零日漏洞,至少有400个组织因此遭到黑客攻击。该漏洞允许攻击者远程执行恶意代码,访问服务器文件及网络系统。受影响的组织包括美国国家核安全局等政府机构。此次攻击最早可追溯至7月7日,微软已发布补丁。谷歌和微软认为有中国黑客组织利用此漏洞,但中国政府对此予以否认。该漏洞的出现标志着零日漏洞利用的增加,企业需警惕潜在风险。

🎯 **SharePoint零日漏洞广泛传播,致使400余组织面临安全风险。** 荷兰网络安全公司Eye Security发现了这一漏洞,并确认了数百个受影响的SharePoint服务器,数量远超此前披露的几十个。这表明该漏洞已被广泛利用,对企业数据安全构成了严重威胁。

🏛️ **美国国家核安全局等政府机构亦未能幸免。** 此次攻击的受害者名单中包括负责美国核武器储备的联邦机构——国家核安全管理局(NNSA)。此外,多个其他政府部门和机构也报告称遭到早期攻击,凸显了该漏洞对关键基础设施的潜在破坏力。

💻 **零日漏洞(CVE-2025-53770)允许远程代码执行,访问敏感数据。** 该漏洞针对企业自行托管的SharePoint版本,一旦被利用,攻击者便可在服务器上远程运行恶意代码,进而获取存储在服务器内的文件以及公司网络内的其他系统。

🛡️ **微软已发布补丁,但需警惕更多黑客组织利用。** 由于此为零日漏洞,微软在漏洞被利用前未能及时发布补丁。目前微软已为所有受影响版本发布了修复程序。然而,谷歌和微软均表示有证据表明中国支持的黑客组织正在利用该漏洞,并警告预计会有更多黑客团体趁机发动攻击。

Security researchers say hackers have breached at least 400 organizations by exploiting a zero-day vulnerability in Microsoft SharePoint, signalling a sharp rise in the number of detected compromises since the bug was discovered last week.

Eye Security, a Dutch cybersecurity firm that first identified the vulnerability in SharePoint, a popular server software that companies use to store and share internal documents, said it had identified hundreds of affected SharePoint servers by scanning the internet. The number has risen from the dozens of known compromised servers as of earlier this week.

Bloomberg reports that one of the affected organizations includes the National Nuclear Security Administration (NNSA), the federal agency responsible for maintaining and developing the U.S. stockpile of nuclear weapons. A spokesperson for the Department of Energy, which houses the NNSA, did not respond to TechCrunch’s request for comment.

Several other government departments and agencies were also compromised in an early wave of attacks exploiting the SharePoint bug, researchers confirmed. Data suggests hackers were exploiting the vulnerability as early as July 7.

The bug, officially known as CVE-2025-53770, affects self-hosted versions of SharePoint that companies set up and manage on their own servers. Once exploited, the bug allows an attacker to remotely run malicious code on the affected server, permitting access to the files stored inside, as well as other systems on the company’s wider network.

The vulnerability is known as a zero-day because Microsoft had no time to release patches before it was exploited. Microsoft has since released patches for all affected SharePoint versions.

Google and Microsoft say they have evidence that several China-backed hacking groups are exploiting the bug, but warned companies to expect an uptick in compromises as more hacker groups seek to take advantage of the vulnerability. The Chinese government denied the allegations.

Techcrunch event

San Francisco | October 27-29, 2025

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

SharePoint 零日漏洞 网络安全 黑客攻击 数据泄露
相关文章