Guides
What are the common hazards and risks in the workplace?
Hackers have broke into 85 SharePoint servers worldwide. They hit multinational corporations, government agencies, and banks across the US, Germany, France, and Australia.
Microsoft confirmed active exploitation of CVE-2025-53770, a critical zero-day vulnerability with a CVSS score of 9.8. As of posting, Microsoft have no patch ready.
Unknown attackers exploited a "significant vulnerability" in Microsoft's SharePoint collaboration software, hitting targets around the world.
If your business documents, financial records, and internal communications sit on SharePoint, those files face immediate risk. In this article, we will break down that risk into laymen terms and provide some insight on immediate steps to mitigate.
CVE-2025-53770 stems from SharePoint's deserialising of untrusted data and can lead to unauthenticated remote code execution with no user interaction required. In other words, hackers can break into your SharePoint server without needing passwords, usernames, or any credentials.
The vulnerability affects three SharePoint versions:
SharePoint Online in Microsoft 365 is not vulnerable. If you use SharePoint through Office 365, you're safe. But if your company runs SharePoint on its own servers, you face serious danger.
Eye Security discovered that within hours of detecting the initial compromise, they pinpointed more than dozens of servers compromised "using the exact same payload at the same filepath". Hackers aren't targeting individual companies. They're running automated attacks against thousands of SharePoint servers globally.
This falls squarely under technological risk. The zero-day flaw has been described as a variant of CVE-2025-49706, a spoofing bug in Microsoft SharePoint Server that was addressed by the tech giant as part of its July 2025 Patch Tuesday updates. Even Microsoft's recent security patches didn't stop this new attack method.
Your company runs on-premises SharePoint servers: Tens of thousands of these servers are at risk, experts said, and Microsoft has issued no patch for the flaw, leaving victims around the world scrambling to respond.
You should act immediately if you:
Pete Renals, a senior manager with Palo Alto Networks' Unit 42, said, "we are seeing attempts to exploit thousands of SharePoint servers globally before a patch is available. We have identified dozens of compromised organisations spanning both commercial and government sectors".
The attack doesn't require insider access. Attackers can execute code remotely, bypassing identity protections such as MFA or SSO. Your multi-factor authentication and single sign-on security measures won't protect you.
Is this content useful to you? Consider subscribing for free to get more every week.
Business Interruption and Data Theft
Financial Loss and Operational Standstill
Reputational Damage and Legal Consequences
Long-term Security Concerns
Even when Microsoft releases a patch, your company remains vulnerable. Hackers steal cryptographic keys that let them maintain access to your systems.
Immediate Steps You Must Take Today
Detection and Monitoring
Business Continuity Planning
Consider migrating to SharePoint Online if you currently use on-premises servers. SharePoint as part of Microsoft 365 (SharePoint Online) is not vulnerable. Cloud-based SharePoint receives automatic security updates and doesn't face this specific threat.
Review your third-party software security regularly. This SharePoint vulnerability shows how quickly new attack methods emerge. Build security assessments into your monthly business reviews.
The SharePoint crisis demonstrates that even patched, up-to-date systems face new threats daily. Your business can't wait for perfect security solutions. Take action now to protect your data and operations from this ongoing attack campaign.
Concerned about this threat? You can book time with one of our Advisors today to discuss. Book 30 minutes with us, free ↗
SharePoint zero day exploited, governments hit, no patch yet | The Stack | July 20, 2025
SharePoint Under Siege: ToolShell Mass Exploitation (CVE-2025-53770) | Eye Security | July 19, 2025
A zero-day vulnerability is a security flaw that hackers know about but the software company doesn't. Think of it like finding an unlocked back door to a building that the owner doesn't know exists. The term "zero-day" means there have been zero days to fix the problem since it was discovered. In this SharePoint case, attackers found a way to break into systems that Microsoft didn't know was possible. They exploited it for days before Microsoft learned about the attacks and could start working on a fix.
Remote code execution means hackers can run their own programs on your computer or server from anywhere in the world, without being physically present. It's like someone being able to operate your office computer from their home, opening files, installing software, or stealing data. In the SharePoint vulnerability, attackers can execute commands on your SharePoint server as if they were sitting at your IT desk with full administrator access. They can copy files, install malware, or use your server to attack other systems.
Multi-factor authentication (MFA) and single sign-on (SSO) are like security guards at the front door of your building. They check IDs and verify people before letting them in. But this SharePoint vulnerability is like a hidden tunnel that goes directly into the building, completely avoiding the front door security. The hackers don't need to present credentials or pass through your authentication systems because they're exploiting a flaw in how SharePoint processes certain data. Your security measures are still important, but they can't protect against attacks that don't use the normal entry points.
Cryptographic keys are like master keys that unlock encrypted data and verify the authenticity of digital communications. In SharePoint's case, these keys (called ValidationKey and DecryptionKey) are used to ensure that requests to the server are legitimate. When hackers steal these keys, they can create fake but valid-looking requests that SharePoint will trust and process. It's like someone stealing the master key to your office building and being able to make perfect copies. Even after you change the locks (patch the vulnerability), they can still get in using their copied keys until you replace the entire locking system.
We're a boutique advisory putting people at the forefront of effective resilience. Specialists in supporting the Oceania and ASEAN regions.
