Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacking Groups
July 22, 2025
In a recent announcement, Microsoft has officially connected the exploitation of vulnerabilities in SharePoint Server instances to two Chinese cybercriminal organizations known as Linen Typhoon and Violet Typhoon. This confirmation reinforces prior reports regarding the ongoing attacks, which have been evident since July 7, 2025. Additionally, Microsoft has identified a third hacker group, tracked as Storm-2603, that is also leveraging these security flaws to gain unauthorized access to targeted organizations.
According to Microsoft, the increasing prevalence of these exploits highlights a significant concern for businesses utilizing unpatched on-premises SharePoint systems. The company expresses high confidence that these threat actors will continue to adapt these vulnerabilities into their modus operandi, escalating the risk for organizations worldwide.
Linen Typhoon, also known by aliases such as APT27, Bronze Union, and Emissary Panda, has been operational since 2012. This group has been associated with notable malware families including SysUpdate, HyperBro, and PlugX, showcasing a long-standing capability in executing sophisticated cyber operations. Meanwhile, Violet Typhoon, although less documented than its counterpart, remains actively engaged in similar exploitative activities, characterized by a reliance on specific techniques to infiltrate target networks.
These cyber threats primarily target businesses based in the United States, where reliance on SharePoint Server products may leave substantial exposure points if not adequately secured. The implications for organizations unable to apply timely patches are severe, potentially leading to data breaches and operational disruptions.
Utilizing the MITRE ATT&CK framework sheds light on the tactics and techniques employed by these adversaries. Initial access may be achieved through exploiting vulnerabilities in software, while persistence and privilege escalation tactics could be utilized to maintain access and elevate user rights within compromised systems. Such methods underline the sophisticated nature of these attacks, necessitating a proactive approach to vulnerability management among impacted organizations.
It is crucial for business owners to remain vigilant in their cybersecurity posture, safeguarding against these evolving threats. Regular updates and patches to software, coupled with informed awareness of potential vulnerabilities, can help mitigate risks posed by adversaries like Linen Typhoon, Violet Typhoon, and Storm-2603. As the landscape of cyber threats continues to shift, maintaining robust defenses has never been more paramount for organizations aiming to protect their digital assets.