The FBI in the US said on Sunday it is aware of the attacks and is working closely with its federal and private-sector partners, but offered no other details.
In an alert issued on Saturday, Microsoft said the vulnerabilities apply only to SharePoint servers used within organisations. It said that SharePoint Online in Microsoft 365, which is in the cloud, was not hit by the attacks.
“We’ve been coordinating closely with CISA, DOD Cyber Defense Command and key cybersecurity partners globally throughout our response,” a Microsoft spokesman said, adding that the company had issued security updates and urged customers to install them immediately.
The Washington Post, which first reported the hacks, said unidentified actors in the past few days had exploited a flaw to launch an attack that targeted US and international agencies and businesses.
The hack is known as a “zero day” attack because it targeted a previously unknown vulnerability, the newspaper said, quoting experts. Tens of thousands of servers were at risk.
Updates
In the alert, Microsoft said that a vulnerability “allows an authorised attacker to perform spoofing over a network”. It issued recommendations to stop the attackers from exploiting it.
In a spoofing attack, an actor can manipulate financial markets or agencies by hiding the actor’s identity and appearing to be a trusted person, organisation or website.
Read: Thousands targeted: NSO’s WhatsApp hacking spree revealed
Earlier, Microsoft said it is working on updates to 2016 and 2019 versions of SharePoint. If customers cannot enable recommended malware protection, they should disconnect their servers from the internet until a security update is available, it added. — Timothy Gardner, (c) 2025 Reuters
Get breaking news from TechCentral on WhatsApp. Sign up here.
Don’t miss:
Hackers tighten grip as ransomware epidemic hits South Africa hard