preston_gralla
Contributing Editor

Again? Microsoft hit for poor security in major SharePoint hack

opinion
Jul 30, 20256 mins

The company has been called out repeatedly for inadequate security practices, and now we have another case in point: a successful SharePoint hack thatโ€™s among the worst in Microsoftโ€™s history.

Hacker
Credit: Black_Kira / Shutterstock.com

Once again, Microsoft software is at the center of a massive global attack that has victimized vital US government agencies and businesses around the world. This time, the security hole is in SharePoint, Microsoftโ€™s widely used collaboration software used to build company and agency websites, manage files and documents, and help people share and work together on documents. 

SharePoint also works with Outlook email and Microsoftโ€™s Teams collaboration software, making the hack that much more dangerous.

Only on-premises SharePoint servers have the hole and have been attacked โ€” cloud-based SharePoint isnโ€™t vulnerable.

The hack is one of the worst and most widespread in Microsoftโ€™s long, sad history of failed software security. How bad is it? Tens of thousands of servers have been victimized. In addition to countless businesses, important government agencies have been hit as well. 

The National Institutes of Health as well as the National Nuclear Security Administration (NNSA), which is in charge of the nationโ€™s nuclear security, are among the victims. According to The Washington Post, โ€œThe NNSA helps keep 5,000 nuclear warheads secure and ready, guards against radiation leaks, and ensures that weapons do not mistakenly detonate.โ€

Other federal agencies hacked include the Department of Homeland Security (DHS), which means the Cybersecurity and Infrastructure Security Agency, Transportation Security Administration, Customs and Border Protection, and the Federal Emergency Management Agency were also affected. The list goes on. 

As with past hacks, Microsoftโ€™s poor security practices are under the spotlight. The company did such a bad job patching the flaw that hackers were able to make their way through even after the patch was issued, according to security firm Sophos. Even after another patch closed the hole, hackers were likely already inside company and government networks, where they could be still wreaking havoc.

This happened even though for years Microsoft has been called out for inadequate security practices. A year ago, the DHS issued a blistering report detailing Microsoftโ€™s security failures that allowed Chinese spies to break into the accounts of high-level government officials in charge of the US relations with China, including Commerce Secretary Gina Raimondo, Ambassador to China Nicholas Burns, and Rep. Don Bacon (R-NE). 

That report found โ€œthe cascade of Microsoftโ€™s avoidable errorsโ€ฆallowed this intrusion to succeedโ€ and concluded that Microsoftโ€™s security is โ€œinadequate and requires an overhaul.โ€

Yet here we are a year later, and nothing seemed to change. How did the hack happen and what might be next for the company? Read on for details.

A look at the hack โ€“ and Microsoftโ€™s response

According to the federal Cybersecuity and Infrastructure Security Agency (CISA), the hack allowed attackers to break into SharePoint servers and install a backdoor called โ€œToolShell,โ€ giving them full access to all SharePoint content, including files and systems throughout enterprises. It also allowed hackers to remotely execute commands and completely take over SharePoint.

A blog post from Eye Security warns the attacks also steal SharePoint server ASP.NET machine keys, which โ€œcan be used to facilitate further attacks, even at a later date.โ€ So merely patching the vulnerability isnโ€™t enough. Enterprises and government agencies need to go further, including rotating the machine keys so the old ones wonโ€™t work and restarting Internet Information Services (IIS) on all their SharePoint servers.

Microsoft says hackers tied to the Chinese government, Linen Typhoon and Violet Typhoon, are among the groups that have exploited the hack. It adds that another Chinese group, Storm-2603, used the hack to deploy ransomware in enterprises.

Researchers say much of the damage could have been avoided if Microsoft properly patched the security hole quickly and followed up to help companies banish hackers that still had access to SharePoint. The hack is particularly dangerous, because it combines two security exploits โ€” one that allows hackers to get into SharePoint and another that allows them to steal and use SharePoint server ASP.NET machine keys. 

Sunil Varkey, an advisor at Beagle Security, blames Microsoft for missing that several security vulnerabilities were related, which made the attack much worse. He told CSO Online: โ€œIn cybersecurity, a single vulnerability can pose a significant risk, but when vulnerabilities are combined, the consequences can be catastrophic. This wasnโ€™t just a technical miss. It was a strategic failure to recognize how the individual parts combined to form something far more dangerous.โ€

Whatโ€™s next for Microsoft?

In the last major Microsoft cybersecurity breach, during which Chinese spies broke into the accounts of top US government officials, Sens. Eric Schmitt (R-MO) and Ron Wyden (D-OR) sent a pointed letter to the Pentagon asking it to back off from a plan to increase its use of Microsoft products: โ€œWe write with serious concern that the Department of Defense (DoD) is doubling down on a failed strategy of increasing its dependence on Microsoft at a time when Congress and the administration are reviewing concerning cybersecurity lapses that led to a massive hack of senior US officialsโ€™ communications.โ€

Nothing happened at the time โ€” the DoD didnโ€™t do anything about it. This time around, no one from Congress has even bothered to threaten Microsoft. Itโ€™s not clear why, although it might be because Congressional Democrats are too caught up in fighting Trumpโ€™s administration to focus on anything else. 

As for Republicans, theyโ€™re too beholden to Trump to take any action he doesnโ€™t explicitly ask for. And for the moment, the president isnโ€™t paying attention to Microsoftโ€™s security shortcomings. 

But Trump might want something from Microsoft at some point. And if he does, he could well point to the companyโ€™s security shortcomings as the reason heโ€™s threatening it. So, for the companyโ€™s future, it should clean up its security lapses sooner rather than later.

preston_gralla

Preston Gralla is a contributing editor for Computerworld and the author of more than 45 technology books, including How the Internet Works and How Wireless Works.

Earlier in his career, Preston was the founding managing editor of the PC Week and a founding editor of PC/Computing. During his tenure, PC/Computing was a finalist for General Excellence from the National Magazine Awards. He was an executive editor and columnist for CNet and ZDNet. His work has appeared in The Verge, PCWorld, USA Today, PC Magazine, the Los Angeles Times, and Boston Magazine, among other publications.

His Eye on Microsoft column won a 2024 AZBEE award.

More from this author