this post was submitted on 23 Jul 2025
185 points (97.0% liked)

Technology

73232 readers
4079 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Security researchers at Google and Microsoft say they have evidence that hackers backed by China are exploiting a zero-day bug in Microsoft SharePoint, as companies around the world scramble to patch the flaw.

The bug, known officially as CVE-2025-53770 and discovered last weekend, allows hackers to steal sensitive private keys from self-hosted versions of SharePoint, a software server widely used by companies and organizations to store and share internal documents. Once exploited, an attacker can use the bug to remotely plant malware and gain access to the files and data stored within, as well as gain access to other systems on the same network.

top 28 comments
sorted by: hot top controversial new old
[–] TheReturnOfPEB@reddthat.com 59 points 4 days ago (1 children)

almost makes one forget this is a problem that Microsoft created.

[–] CosmoNova@lemmy.world 7 points 4 days ago (1 children)

Well yes these type of things can happen to virtually any type of complex software to anyone. Though the lacking response is concerning.

[–] corsicanguppy@lemmy.ca 14 points 4 days ago

concerning

Or a trend.

[–] Oisteink 42 points 4 days ago (3 children)

That’s not a zero-day… Really dislike media that waters down or misuse terminology

[–] Senseless@feddit.org 14 points 4 days ago

So that would make it a zero-oneandahalf-week.

[–] theunknownmuncher@lemmy.world 7 points 4 days ago

It's not just media. The number of software engineers I've heard talk about "fixing" a "zero day" in a code dependency by updating to a patched version...

[–] theneverfox@pawb.social 7 points 4 days ago (1 children)

Well, it's a zero day for 24 hours, right?

[–] Oisteink 19 points 4 days ago (1 children)

Yepp - it was, but that day was 11. June

[–] Passerby6497@lemmy.world 26 points 4 days ago* (last edited 4 days ago) (2 children)

I don't think that's true either, based on the reporting it's based on a bug disclosed at a hacking conference in May. No clue how this is a zero day if it's based on a 2 month old bug reported to the vendor.

Seems more like bog standard Microsoft fucking around and waiting too long to patch before it got used.

[–] 100@fedia.io 7 points 4 days ago

wonder if they got a case to sue for damages if microsoft has been slow at dealing with the issue

Iirc there was a previous attempt to patch this, it would appear a slight variation was not fixed in the patch. Might be why people are saying zero day.

[–] drmoose@lemmy.world 30 points 4 days ago* (last edited 4 days ago) (1 children)

The attack exploits SharePoint vulnerabilities originally disclosed at a Berlin hacking competition in May, where a Vietnamese cybersecurity researcher received a $100,000 bounty for discovering the flaws. Reuters reported that Microsoft was allegedly informed of the vulnerabilities in May but failed to fully address them in an initial July patch

And

Several cybersecurity experts compared the SharePoint campaign to the 2021 Microsoft Exchange server attacks that compromised US government systems. Former FBI Cyber Unit deputy director Cynthia Kaiser warned that hackers "already in their systems may lie dormant for extended periods before operationalizing"

Just shows in what a poor position US is now. Allies discovered it, reported it, feds didn't prepare for it and Chinese are in. Incredible incompetence except for US allies that despite US' isolationism still care.

Source

[–] adespoton@lemmy.ca 11 points 4 days ago (1 children)

Yeah; allies still care because of the US military industrial complex. Compromising the US still compromises a large chunk of the world, making things even worse for everyone than the current US administration can do on its own.

[–] Squizzy@lemmy.world 2 points 2 days ago

And the rest of the world are not petulant children ready and willing to remove any semblance of cooperation, appreciation or decency.

[–] paraphrand@lemmy.world 26 points 4 days ago (2 children)

SharePoint is a nightmare. 😥

[–] somerandomperson@lemmy.dbzer0.com 7 points 4 days ago* (last edited 4 days ago)

Micro$oft is a nightmare.

Heck, all of big tech is a nightmare.

[–] elucubra@sopuli.xyz 5 points 4 days ago

Agree. I work with an org that uses SharePoint, I don't. When they share docs with me, I can't directly transfer (or maybe I haven't found how) to One drive. I mean, they are both MS Cloud. Why?

[–] yardratianSoma@lemmy.ca 5 points 3 days ago

When I say things like, "Use linux, the attack surface is much smaller", people say, "well, that won't last forever", to which I say, "if a trillion dollar company can drop the ball like this, I'm taking the route less travelled because society doesn't change quickly, Microsoft isn't going anywhere in my forseeable future"

[–] just_another_person@lemmy.world 15 points 4 days ago (2 children)

This is what you get when you don't patch your shit after being told about it MONTHS before it was demonstrated, and MONTHS after.

[–] drmoose@lemmy.world 2 points 4 days ago (1 children)

Even then this clearly effects US' federal government so all this talk of domestic security for bringing back businesses to US are quite laughable with this context.

[–] overload@sopuli.xyz -2 points 4 days ago (2 children)

This is a zero-day bug though?

[–] fushuan@piefed.blahaj.zone 3 points 4 days ago

It's not, the title lies.

[–] just_another_person@lemmy.world 1 points 4 days ago (1 children)
[–] overload@sopuli.xyz 0 points 4 days ago* (last edited 4 days ago) (1 children)

I did.. It looks like the bug has been exploited for a couple of weeks now, with a patch only being released on 20th of July? That makes it zero-day

The bug is regarded as a zero-day because the vendor — Microsoft, in this case — had no time to issue a patch before it was actively exploited.

Edit: realised we might have different definition of zero day. Depends whether you consider that the vendor didn't know about the issue, or there isn't a patch available upon exploitation of the vulnerability.

[–] SkyeStarfall@lemmy.blahaj.zone 5 points 4 days ago (1 children)

Zero day is typically defined as there being zero days since the vulnerability is known to the developer, in other words, it being unknown at the time of the exploit.

https://en.wikipedia.org/wiki/Zero-day_vulnerability?wprov=sfla1

[–] overload@sopuli.xyz 1 points 4 days ago* (last edited 4 days ago)

Ah thank you. I thought zero day and 1 day vulnerabilities were: 0-day = vulnerability is not known to the vendor and so there is no patch. If exploited, it is a 0-day attack. 1-day = vulnerability is known and patch is available, but not all systems are patched.

I.E. the actual number of days doesn't matter.

[–] Cypher@lemmy.world 6 points 4 days ago

I have been dealing with this the last couple of days, Microsofts incompetence never fails to impress.