SharePoint Zero-Day Attacks Surge: Over 400 Organizations Breached Amid Critical Microsoft Vulnerabilities

SharePoint Zero-Day Attacks Surge: Over 400 Organizations Breached Amid Critical Microsoft Vulnerabilities

User avatar placeholder
Written by Dave W. Shanahan

July 24, 2025

A wave of cyberattacks linked to Chinese-backed threat actors is sweeping across global enterprises, exploiting multiple zero-day vulnerabilities in Microsoft SharePoint. These coordinated attacks—leveraging CVE-2025-49704, CVE-2025-49706, and newly identified patch bypasses CVE-2025-53770 and CVE-2025-53771—are fueling both ransomware outbreaks and strategic espionage campaigns. At least 400 organizations have been breached as of July 24, 2025 (via Bloomberg), with high-profile targets including the U.S. Nuclear Agency, critical infrastructure, and major enterprises.

SharePoint Zero-Day Vulnerabilities Involved

SharePoint Zero-Day Attacks Surge: Over 400 Organizations Breached Amid Critical Microsoft Vulnerabilities

 

Recent investigations have uncovered four critical flaws at the heart of this campaign:

CVE-ID Description Patch Status
CVE-2025-49704 Remote code execution in SharePoint Patch released, but exploits continue
CVE-2025-49706 Authentication bypass vulnerability Patch released, attackers still active
CVE-2025-53770 Patch bypass for previous zero-days No comprehensive fix
CVE-2025-53771 Improper validation enabling privilege escalation No comprehensive fix

These loopholes allow attackers to:

  • Steal admin credentials and sensitive data.

  • Deploy ransomware that cripples organizations’ business operations.

  • Establish backdoors for ongoing espionage activities.

How the Attacks Unfold

Step 1: Initial Exploitation

Attackers target unpatched or partially patched SharePoint servers using weaponized exploits. Once inside, they quickly escalate privileges and move laterally within affected networks.

Step 2: Payload Deployment

Threat actors deploy ransomware, disrupt mission-critical operations, and in many cases exfiltrate confidential data—sometimes selling it on dark web forums or using it for extortion.

Step 3: Espionage & Persistence

Evidence points to continued presence on compromised systems, suggesting a dual strategy of financial extortion and state-sponsored espionage, particularly against government agencies and vital infrastructure.

Global Impact

  • Victim Count: Over 400 organizations confirmed breached worldwide.

  • Sectors Hit: High-profile victims include U.S. government agencies (notably the U.S. Nuclear Agency), financial institutions, healthcare organizations, and Fortune 500 companies.

  • Ransomware Fallout: Numerous organizations report paralyzed networks, locked files, financial losses from ransom demands, and enduring reputational damage.

  • Espionage Concerns: Attackers have allegedly accessed sensitive, classified, or proprietary data, raising the stakes for governments and private companies alike.

Microsoft’s Response and Ongoing Scrutiny

Microsoft has acknowledged the severity of these attacks and issued urgent guidance for SharePoint customers. The company:

  • Released partial patches for CVE-2025-49704 and CVE-2025-49706 but has not fully mitigated newer bypasses (CVE-2025-53770, CVE-2025-53771).

  • Recommends immediate patching where possible, enhanced log monitoring, and further isolation of vulnerable systems.

  • Faces criticism from security researchers and IT administrators for a perceived delay in addressing the full spectrum of the vulnerabilities and for not providing comprehensive fixes fast enough.

Guidance for IT Teams

  • Patch immediately: Apply available updates to all on-premises SharePoint instances.

  • Implement network segmentation: Restrict access to SharePoint servers from the public internet.

  • Enable advanced monitoring: Use endpoint protection and SIEM tools to watch for signs of lateral movement, privilege escalation, and known IOCs.

  • Backups: Ensure that backups are regularly updated, tested, and kept offline to defend against ransomware.

  • Incident Response: Review Microsoft’s latest mitigation steps and prepare incident response playbooks for potential breaches.

Debate Over On-Premises SharePoint Deployments

Despite Microsoft’s cloud-first push, thousands of organizations worldwide still rely on on-premises SharePoint for sensitive document management. The current zero-day crisis renews questions about:

  • The wisdom of sustaining local deployments versus migrating to Microsoft 365 cloud services.

  • The difficulty IT teams face in keeping on-premises servers up-to-date, especially with incomplete or evolving patch cycles.

  • Whether Microsoft’s cloud platforms provide better intrinsic security or simply shift the attack surface elsewhere.

Security Community and Industry Reactions

Prominent cybersecurity firms and U.S. policymakers are pressing Microsoft to:

  • Provide rapid, full-spectrum patches—not just workarounds or “band-aid” fixes.

  • Increase transparency about exploitation timelines and reconnaissance by threat actors.

  • Consider automatic patching models for critical vulnerabilities in key software like SharePoint.

Recent industry roundtables echo the urgency: “These flaws underline the high, persistent risk facing any organization running core Microsoft infrastructure on-premises, especially when attackers weaponize their detection of patch gaps against mission-critical services.”

What’s Next?

  • Ongoing Exploitation: Security analysts expect further victim disclosures as investigations continue and additional groups attempt to exploit the same weaknesses.

  • Regulatory Pressure: With government agencies hit, expect deeper scrutiny from regulators regarding how Microsoft and large organizations manage vulnerability disclosure, patching, and risk—possibly spurring new policy mandates.

  • Wider Attack Campaigns: Copycat actors are likely to target organizations slow to update, prolonging the threat window.

Organizations must act immediately to secure their systems, remain vigilant for signs of compromise, and implement layered defense strategies given the evolving tactics of state-backed and criminal hacker groups.

The July 2025 Microsoft SharePoint zero-day crisis is a decisive wake-up call for the global community. With hundreds of organizations breached—including the U.S. Nuclear Agency—security posture for legacy, on-premises SharePoint must be urgently reevaluated. Microsoft’s response, the speed of patch deployment, and the ability of organizations to adapt will determine the lasting impact of this major cyber incident.


Discover more from Microsoft News Today

Subscribe to get the latest posts sent to your email.

Image placeholder

I'm Dave W. Shanahan, a Microsoft enthusiast with a passion for Windows 11, Xbox, Microsoft 365 Copilot, Azure, and more. After OnMSFT.com closed, I started MSFTNewsNow.com to keep the world updated on Microsoft news. Based in Massachusetts, you can find me on Twitter @Dav3Shanahan or email me at davewshanahan@gmail.com.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.