Was this helpful?
Thumbs UP Thumbs Down

Microsoft confirms SharePoint servers were hit in global hacking incident

Microsoft store in New York
poznan pol  apr 28 2020 laptop computer displaying logo

Microsoft confirms global SharePoint server breaches

Microsoft confirmed hackers breached SharePoint servers using a critical zero-day vulnerability. U.S. federal agencies, universities, energy companies, and businesses were hit, highlighting the attack’s vast scale.

Though Microsoft released patches for some versions, many servers remain vulnerable. Officials noted that only on-premises servers were affected, not Microsoft 365.

This breach reinforces the urgent need for regular patching and proactive cybersecurity strategies as organizations scramble to mitigate global damage from this widespread attack.

Hackers celebrating successful hacking attempt and getting access.

Hackers used zero-day flaw to infiltrate servers

Security experts revealed that hackers exploited a previously unknown vulnerability, classifying this as a zero-day attack. The flaw granted attackers unauthorized access to critical SharePoint servers, allowing remote code execution and data exfiltration.

The discovery has highlighted the speed at which threat actors can capitalize on undisclosed software flaws.

Critics, including lawmakers and former security officials, have questioned Microsoft’s security practices, arguing that decentralized processes may have delayed fully effective patching and allowed bypass exploits to emerge.

tula russia 160120 sharepoint on the laptop screen isolated

Tens of thousands of servers remain at risk

Over 10,000 organizations worldwide are estimated to remain at risk due to slow patching and outdated on‑prem SharePoint infrastructure.

Many organizations depend on legacy SharePoint installations without proper update mechanisms, leaving them highly susceptible. Security teams are racing to assess vulnerabilities and deploy emergency patches.

The exposure scale shows that even widely trusted enterprise software can rapidly become a liability when security patches lag behind active cyber threats targeting organizations worldwide.

washington dc usa  february 29 2020 entrance to federal

Government agencies top the victim list

The breach affected at least two U.S. federal agencies, state governments, and local organizations. Victims included document repositories containing essential public resources.

Due to confidentiality rules, specific agencies weren’t named, but several lost access to critical documents after attackers hijacked their systems.

The incident reveals how vulnerable even government-run repositories are to cyberattacks. Securing secure operations has become a nationwide priority, and agencies depend on these servers.

speaker giving a talk in conference hall at business event

Private sector organizations were not spared

Private entities were heavily impacted alongside public institutions. Security researchers reported breaches affecting universities, energy providers, and telecommunications firms across multiple continents.

This widespread compromise demonstrates that the attackers were opportunistic, exploiting unpatched SharePoint servers regardless of industry.

The interconnectedness of modern enterprise systems means breaches can ripple across supply chains and industries. The attack’s breadth underlines the critical role of cybersecurity readiness in public and private sectors.

Closeup shot of using keyboard there is coffee cups

Hackers stole data and cryptographic keys

Investigations revealed that attackers accessed sensitive documents and stole cryptographic keys from compromised servers. These keys allow persistent access, letting hackers bypass future security measures even after applying patches.

Researchers warn that this tactic enables attackers to regain entry weeks or months later without detection.

The discovery has significantly escalated concerns about long-term cybersecurity risks tied to this breach. Persistent backdoors left by hackers may require comprehensive security audits and server rebuilds for resolution.

System hacked warning alert on laptop

Some documents were hijacked or deleted

In one reported case, attackers hijacked a state government’s public document repository. The agency lost access to educational resources to help residents understand government functions.

While it remains unclear if files were deleted or just blocked, the breach exemplifies the operational disruption such cyberattacks can cause.

The incident also highlights a growing concern over “wiper” attacks, where data is intentionally destroyed rather than stolen, raising alarm across other U.S. states regarding similar risks.

microsoft office 365

Cloud-based SharePoint remained unaffected

Organizations using Microsoft’s cloud-based services like SharePoint Online and Microsoft 365 were untouched. Attackers targeted on-premises SharePoint servers specifically, which are often harder for Microsoft to monitor directly.

This distinction offers a degree of reassurance for cloud-first enterprises. However, the attack also exposes the higher risks organizations face when relying on self-hosted systems without strict patching protocols.

It’s a harsh reminder that on-premises infrastructure demands dedicated cybersecurity strategies to avoid catastrophic breaches.

System update software

Microsoft released patches, but not for all servers

Microsoft issued emergency security patches for the SharePoint Subscription Edition and the SharePoint 2019 versions. Unfortunately, older SharePoint 2016 servers initially received no patch, leaving countless organizations vulnerable.

Microsoft advised 2016 users to immediately disconnect their servers from the internet as engineers worked on solutions.

This slow response sparked frustration among cybersecurity experts and business leaders alike. The situation exposes critical delays in Microsoft’s response processes, especially for organizations relying on legacy server software.

Federal bureau of investigation indianapolis

FBI and global agencies launched investigations

The FBI quickly confirmed it was investigating the incident alongside cybersecurity partners in Canada, Australia, and other nations.

With attacks spanning multiple sectors and continents, law enforcement agencies initiated an international effort to track the attackers and understand their objectives.

The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) also became heavily involved. The sheer global reach of this attack underscores how cybersecurity is now a critical domain of national security priorities.

A group of hackers busy on a task

Attackers used stolen keys to maintain access

Security researchers revealed that attackers stole cryptographic keys that allow them to impersonate legitimate users and services within compromised networks.

Hackers could retain access through persistent backdoors even after organizations patch their SharePoint servers. Experts describe this as a “silent threat” capable of compromising organizations for weeks or months unnoticed.

Organizations are being advised not just to patch systems, but also to review user authentications and consider complete key replacement wherever feasible.

Microsoft store in New York

Microsoft blamed for narrow patch focus

Critics argue Microsoft’s initial security fixes were too narrowly designed, leaving similar vulnerabilities exploitable.

Security analysts warn that CVE‑2025‑53771 acted as a bypass for earlier fixes, meaning attackers could exploit patched systems before comprehensive updates were deployed.

Cybersecurity analysts say Microsoft underestimated the risk and failed to anticipate secondary exploits.

us capitol lights north side congress house representatives senate capital

Confidentiality agreements conceal victim names

Though at least two U.S. federal agencies were breached, researchers have been unable to disclose their names due to strict victim confidentiality agreements.

These rules aim to protect affected organizations from public fallout and further targeting. However, experts argue that withholding names may delay industry-wide mitigation efforts.

State governments have been more forthcoming, reporting hijacked repositories and missing documents, offering public evidence of the attack’s scale and operational impact on governance processes.

Global concept

Breaches span over twenty nations worldwide

This cyberattack didn’t focus solely on the U.S. Researchers confirmed breaches in Europe, South America, Asia, and Australia, targeting public institutions and private businesses.

The compromised entities were among the European government agencies, a Brazilian university, Spanish local governments, and telecom firms in Asia.

The attackers’ strategy appears non-discriminatory: exploiting as many vulnerable SharePoint servers as possible, regardless of industry or geography. This global scale suggests the attackers aim to maximize disruption and data theft.

Female programmer coding on desktop computer with multiple screens.

CISA coordinated emergency responses across states

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) coordinated with state, local, and tribal officials to share threat intelligence and coordinate defenses.

State cybersecurity teams scrambled to assess their infrastructure, sharing vulnerability notices and breach alerts across sectors. Despite lacking a permanent director, CISA’s acting leadership maintained a round-the-clock response.

The incident underscores the vital role of coordinated federal oversight in mitigating national cybersecurity crises, especially when state resources are limited or outdated.

Wondering how cybersecurity is evolving for everyday users? See why Microsoft’s ditching passwords this August here.

Man working on a laptop, cybersecurity concept

Global cybersecurity lessons from this breach

This breach is a wake-up call for organizations still depending on legacy, on-premises infrastructure. Cybersecurity experts stress the need for proactive patch management, comprehensive key management, and system monitoring.

Solely relying on vendor patches may no longer be enough. Organizations must adopt zero-trust principles and assume breach readiness.

Microsoft’s failures reveal that even trusted vendors can falter. As the investigation unfolds, industries worldwide are urged to reevaluate their cybersecurity strategies immediately.

Curious how Microsoft’s latest moves are stirring controversy? Find out why its visa push is raising eyebrows here.

What do you think about Microsoft being attacked by hackers? Do you know if Microsoft can prevent these attacks in the future? Please share your thoughts and drop a comment.

Read More From This Brand:

Don’t forget to follow us for more exclusive content on MSN.

If you liked this story, you’ll LOVE our FREE emails. Join today and be the first to get stories like this one.

This slideshow was made with AI assistance and human editing.

This content is exclusive for our subscribers.

Get instant FREE access to ALL of our articles.

Was this helpful?
Thumbs UP Thumbs Down
Prev Next
Share this post

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!

Send feedback to ComputerUser



    We appreciate you taking the time to share your feedback about this page with us.

    Whether it's praise for something good, or ideas to improve something that isn't quite right, we're excited to hear from you.