Microsoft is investigating a sweeping cyber‑espionage campaign that exploited a zero‑day flaw in on‑prem SharePoint servers, letting attackers burrow into corporate and government networks across North America and Europe. Researchers at Eye Security and the Shadowserver Foundation say at least 100 organizations have confirmed breaches, with thousands more servers still exposed despite an emergency patch released over the weekend.
The intruders leveraged the vulnerability to gain initial access, plant backdoors and siphon sensitive files, prompting urgent guidance from CISA and Britain’s NCSC to isolate affected systems and hunt for persistence mechanisms. Because SharePoint often acts as a core document hub, experts warn the breach could enable wider lateral movement even after servers are patched.
With the FBI and European agencies launching parallel probes, security analysts are urging organizations to reset credentials, comb logs for post‑exploitation tools and enforce network segmentation. The incident highlights the growing risks of on‑prem software as state‑linked hackers target collaboration platforms that store troves of confidential data.
Disclosure: This list is intended as an informational resource and is based on independent research and publicly available information. It does not imply that these businesses are the absolute best in their category. Learn more here.
This article may contain commission-based affiliate links. Learn more on our Privacy Policy page.
Stay informed with the best tips, trends, and news — straight to your inbox.
By submitting I agree to Brand Vision Privacy Policy and T&C.