Close Menu
Stratnews GlobalStratnews Global
    Facebook X (Twitter) Instagram
    Trending
    • Atomic Clock Failure On IRNSS-1F Pushes India’s NavIC Navigation Constellation Below Operational Threshold
    • Ukraine Opens Battlefield Data For AI Drone Training
    • Data Centres Become Election Issue In France
    • Apple Slashes App Store Fees In China
    • Google Names London HQ ‘Platform 37’ After AlphaGo Move
    • Pentagon Allows Limited Use Of Anthropic AI
    • Why Venture Capital Is Suddenly Betting on Indian Deep Tech
    • UK Warns Social Media Firms Over Child Safety
    • Support Us
    Stratnews GlobalStratnews Global
    Write for Us
    Sunday, March 15
    • Space
    • Science
    • AI and Robotics
    • Industry News
    • Support Us
    Stratnews GlobalStratnews Global
    Home » Massive Cyber Espionage Hits Microsoft Servers: 100 Organisations Breached Globally

    Massive Cyber Espionage Hits Microsoft Servers: 100 Organisations Breached Globally

    Aditya LenkaBy Aditya LenkaJuly 22, 2025 General No Comments3 Mins Read

    A sweeping cyber-espionage campaign exploiting a critical vulnerability in Microsoft’s server software has compromised at least 100 organisations worldwide, according to cybersecurity researchers who exposed the operation.

    Over the weekend, Microsoft issued an urgent alert warning of “active attacks” targeting self-hosted SharePoint servers, software commonly used by firms for internal document sharing and collaboration. Microsoft-hosted SharePoint services remain unaffected.

    The cyber assault, dubbed a “zero-day” attack due to its reliance on a previously undiscovered software flaw, allows hackers to infiltrate servers and potentially implant backdoors for ongoing access to compromised networks.

    Vaisha Bernard, chief hacker at Netherlands-based cybersecurity firm Eye Security, revealed that nearly 100 victims had been identified through a global scan using Shadowserver Foundation tools. These findings came before the method of exploitation became widely known, suggesting more breaches may now exist.

    “It’s unambiguous,” Bernard said. “Who knows what other adversaries have done since to place other backdoors.” He refrained from naming affected organisations, citing official security protocols and notification of national authorities.

    The Shadowserver Foundation corroborated Bernard’s count, noting that most compromised servers were located in the United States and Germany, with victims including government agencies.

    Rafe Pilling, Director of Threat Intelligence at UK-based Sophos, added that the attack, for now, appears to be the work of a single entity or coordinated group, but warned this could change rapidly as awareness of the flaw spreads.

    Microsoft confirmed that security updates had been released and urged all users to apply them promptly.

    The identity of the hackers remains uncertain. However, Alphabet-owned Google, leveraging its expansive visibility across internet traffic, attributed some of the breaches to a China-linked threat actor. As expected, China’s government has denied involvement.

    The FBI acknowledged awareness of the attacks and stated it was working alongside both public and private partners, without divulging further details. Britain’s National Cyber Security Centre also noted a “limited number” of targets in the UK.

    Analysts warn that the scale of potential exposure is massive. Shodan, a search engine that maps internet-connected devices, estimates that over 8,000 servers globally could be vulnerable. Shadowserver places the figure slightly higher, above 9,000.

    High-profile potential targets include major industrial firms, financial institutions, auditors, healthcare providers, and government bodies across both U.S. state and international jurisdictions.

    Daniel Card of British cybersecurity consultancy PwnDefend cautioned, “The SharePoint incident appears to have created a broad level of compromise across a range of servers globally. Assuming breach is wise—and applying the patch alone isn’t enough.”

    Cybersecurity experts advise organisations to investigate server logs for signs of compromise and to undertake comprehensive incident response beyond mere patching to ensure security.

    With inputs from Reuters

    Author

    • Aditya Lenka
      Aditya Lenka

      A multi-faceted professional with a diverse range of skills and experiences. He currently works as a Producer, Digital Marketer, and Journalist for several well-known media outlets, namely StratNewsGlobal, BharatShakti, and Interstellar. With a passion for storytelling and a keen eye for detail, Aditya has covered a wide range of topics and events across India, bringing a unique perspective to his work.When he's not busy producing content, Aditya enjoys exploring new places and cuisines, having traveled extensively throughout India. He's also an avid writer and poet, often penning his thoughts and musings in his free time. And when he wants to unwind and relax, Aditya spends time with his two loyal companions, Zorro and Pablo, his beloved dogs.Aditya's dynamic personality and varied interests make him a unique individual, always eager to learn and experience new things.

      View all posts
    cyber-espionage campaign Featured google Just In Organisations PwnDefend Shadowserver technology
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Reddit Telegram WhatsApp
    Aditya Lenka
    Aditya Lenka

      A multi-faceted professional with a diverse range of skills and experiences. He currently works as a Producer, Digital Marketer, and Journalist for several well-known media outlets, namely StratNewsGlobal, BharatShakti, and Interstellar. With a passion for storytelling and a keen eye for detail, Aditya has covered a wide range of topics and events across India, bringing a unique perspective to his work.When he's not busy producing content, Aditya enjoys exploring new places and cuisines, having traveled extensively throughout India. He's also an avid writer and poet, often penning his thoughts and musings in his free time. And when he wants to unwind and relax, Aditya spends time with his two loyal companions, Zorro and Pablo, his beloved dogs.Aditya's dynamic personality and varied interests make him a unique individual, always eager to learn and experience new things.

      Keep Reading

      Atomic Clock Failure On IRNSS-1F Pushes India’s NavIC Navigation Constellation Below Operational Threshold

      Ukraine Opens Battlefield Data For AI Drone Training

      Data Centres Become Election Issue In France

      Apple Slashes App Store Fees In China

      Google Names London HQ ‘Platform 37’ After AlphaGo Move

      Pentagon Allows Limited Use Of Anthropic AI

      Add A Comment
      Leave A Reply Cancel Reply

      Anti Drone System (CUAS)
      Latest Posts

      Atomic Clock Failure On IRNSS-1F Pushes India’s NavIC Navigation Constellation Below Operational Threshold

      March 14, 2026

      Ukraine Opens Battlefield Data For AI Drone Training

      March 13, 2026

      Data Centres Become Election Issue In France

      March 13, 2026

      Apple Slashes App Store Fees In China

      March 13, 2026

      Google Names London HQ ‘Platform 37’ After AlphaGo Move

      March 12, 2026

      Pentagon Allows Limited Use Of Anthropic AI

      March 12, 2026

      Why Venture Capital Is Suddenly Betting on Indian Deep Tech

      March 12, 2026

      UK Warns Social Media Firms Over Child Safety

      March 12, 2026

      Age Check laws gain momentum as nations target teen access

      March 10, 2026

      Space Exercise Device for Astronaut Microgravity Training

      March 10, 2026

      Subscribe to News

      Get the latest sports news from NewsSite about world, sports and politics.

      • Astronomical Events
      • Space Missions
      • Industry News
      • Science
      StratNewsGlobal Tech
      Facebook X (Twitter) Instagram LinkedIn YouTube
      © 2026 StratNews Global, A unit of BharatShakti Communications LLP
      • About Us
      • Contributors
      • Copyright
      • Contact
      • Write for Us

      Type above and press Enter to search. Press Esc to cancel.