Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups

Date: July 22, 2025
Category: Vulnerability / Threat Intelligence

Microsoft has officially connected the exploitation of vulnerabilities in internet-facing SharePoint Server instances to two Chinese hacker groups, Linen Typhoon and Violet Typhoon, as early as July 7, 2025, confirming earlier claims. Additionally, the company has identified a third threat actor from China, tracked as Storm-2603, also leveraging these vulnerabilities to gain initial access to target organizations. Microsoft stated in a report released today that, “Given the swift adoption of these exploits, we are highly confident that threat actors will continue to incorporate them into their attacks on unpatched on-premises SharePoint systems.” Below is a brief overview of the threat activity clusters:

  • Linen Typhoon (also known as APT27, Bronze Union, Emissary Panda, Iodine, Lucky Mouse, Red Phoenix, and UNC215), active since 2012 and previously linked to malware families including SysUpdate, HyperBro, and PlugX.
  • Violet Typhoon (aka …).

Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacking Groups

July 22, 2025

In a recent announcement, Microsoft has officially connected the exploitation of vulnerabilities in SharePoint Server instances to two Chinese cybercriminal organizations known as Linen Typhoon and Violet Typhoon. This confirmation reinforces prior reports regarding the ongoing attacks, which have been evident since July 7, 2025. Additionally, Microsoft has identified a third hacker group, tracked as Storm-2603, that is also leveraging these security flaws to gain unauthorized access to targeted organizations.

According to Microsoft, the increasing prevalence of these exploits highlights a significant concern for businesses utilizing unpatched on-premises SharePoint systems. The company expresses high confidence that these threat actors will continue to adapt these vulnerabilities into their modus operandi, escalating the risk for organizations worldwide.

Linen Typhoon, also known by aliases such as APT27, Bronze Union, and Emissary Panda, has been operational since 2012. This group has been associated with notable malware families including SysUpdate, HyperBro, and PlugX, showcasing a long-standing capability in executing sophisticated cyber operations. Meanwhile, Violet Typhoon, although less documented than its counterpart, remains actively engaged in similar exploitative activities, characterized by a reliance on specific techniques to infiltrate target networks.

These cyber threats primarily target businesses based in the United States, where reliance on SharePoint Server products may leave substantial exposure points if not adequately secured. The implications for organizations unable to apply timely patches are severe, potentially leading to data breaches and operational disruptions.

Utilizing the MITRE ATT&CK framework sheds light on the tactics and techniques employed by these adversaries. Initial access may be achieved through exploiting vulnerabilities in software, while persistence and privilege escalation tactics could be utilized to maintain access and elevate user rights within compromised systems. Such methods underline the sophisticated nature of these attacks, necessitating a proactive approach to vulnerability management among impacted organizations.

It is crucial for business owners to remain vigilant in their cybersecurity posture, safeguarding against these evolving threats. Regular updates and patches to software, coupled with informed awareness of potential vulnerabilities, can help mitigate risks posed by adversaries like Linen Typhoon, Violet Typhoon, and Storm-2603. As the landscape of cyber threats continues to shift, maintaining robust defenses has never been more paramount for organizations aiming to protect their digital assets.

Source link