Hackers exploited a serious vulnerability in Microsoft’s SharePoint collaboration software, launching a global cyberattack that impacted government agencies, universities, energy companies, and businesses around the world. This zero-day attack targeted on-premises SharePoint servers, compromising sensitive data and disrupting operations.
The Vulnerability and Its Exploitation
The flaw, tracked as CVE-2025-53770 and CVE-2025-53771, was first detected on July 18, 2025. Cybersecurity experts reported attackers used these vulnerabilities to gain unauthorized access to SharePoint servers. This allowed them to plant web shells and steal cryptographic secrets, giving full control over compromised systems.
Impact on U.S. and Global Targets
Multiple U.S. federal and state agencies were affected, especially those in energy and telecommunications. Organizations in Canada, Australia, and Europe also reported similar breaches. Attackers targeted repositories of public documents, leaving some agencies unable to access or recover affected data.
Microsoft’s Response and Ongoing Efforts
Microsoft acknowledged the problem and released emergency patches for SharePoint Subscription Edition and SharePoint 2019. Patches for SharePoint 2016 are still pending. The company advised organizations to apply mitigation steps and watch for suspicious activity.
Security Experts Urge Immediate Action
Experts stress the urgency of addressing this breach. Adam Meyers from CrowdStrike called the vulnerability significant. Pete Renals from Palo Alto Networks said thousands of SharePoint servers worldwide faced exploitation attempts. This breach highlights the need for strong cybersecurity and timely patching.
Looking Ahead: Strengthening Cyber Defenses
As investigations continue, organizations are urged to assess their cybersecurity posture, apply patches quickly, and stay alert to threats. The SharePoint breach is a clear warning about the evolving cyber threat landscape and the need for proactive defense.