Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Wits project pits African creators against AI music's blind spots

      Wits project pits African creators against AI music’s blind spots

      17 April 2026
      Prosus offloads 4.5% of Delivery Hero to Uber for €270-million

      Prosus offloads 4.5% of Delivery Hero to Uber for €270-million

      17 April 2026
      Numsa digs in for 8% as Eskom wage pact splits unions

      Numsa digs in as Eskom wage pact splits unions

      17 April 2026
      Consumers get new weapon against direct marketing spam

      Consumers get new weapon against phone call spam

      16 April 2026
      Standard Bank data breach fallout deepens

      Standard Bank data breach fallout deepens

      16 April 2026
    • World
      Adobe bets on AI agents to fend off cheaper rivals

      Adobe bets on AI agents to fend off cheaper rivals

      16 April 2026
      Google poised to lose ad crown to Meta

      Google poised to lose ad crown to Meta

      14 April 2026
      Grand Theft Data - hackers hit Rockstar Games - Grand Theft Auto

      Grand Theft Data – hackers hit Rockstar Games

      14 April 2026
      UK PM Keir Starmer declares war on doomscrolling

      UK PM Keir Starmer declares war on doomscrolling

      13 April 2026
      Big Tech is going nuclear

      Big Tech is going nuclear

      10 April 2026
    • In-depth
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
    • TCS
      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      15 April 2026
      TCS | Donovan Marsh on AI and the future of filmmaking

      TCS | Donovan Marsh on AI and the future of filmmaking

      7 April 2026
      TCS+ | Vodacom Business moves to crack the SME tech gap - Andrew Fulton, Sannesh Beharie

      TCS+ | Vodacom Business moves to crack the SME tech gap

      7 April 2026
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » South Africa among countries targeted in Microsoft SharePoint attacks

    South Africa among countries targeted in Microsoft SharePoint attacks

    Microsoft has warned that Chinese state-sponsored hackers are among those exploiting flaws in its SharePoint software.
    By Agency Staff23 July 2025
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    South Africa amoung countries targeted in Microsoft SharePoint attacksMicrosoft has warned that Chinese state-sponsored hackers are among those exploiting flaws in its SharePoint software to break into institutions globally, with the US agency responsible for designing nuclear weapons now among those breached.

    In a blog post, the tech giant identified two groups supported by the Chinese government, Linen Typhoon and Violet Typhoon, as leveraging flaws in the document-sharing software that rendered customers who run it on their own networks, as opposed to in the cloud, vulnerable. Another hacking group based in China, which Microsoft calls Storm-2603, also exploited them, according to the blog.

    The number of companies and agencies subjected to breaches as a result of these exploits is meanwhile mounting: hackers have used the SharePoint flaws to break into the US National Nuclear Security Administration, according to a person with knowledge of the matter who wasn’t authorised to speak publicly. Systems belonging to the US education department, Florida’s department of revenue and the Island General Assembly were compromised.

    Cybersecurity researchers have already detected breaches on more than 100 servers representing 60 victims thus far

    While Microsoft has patched its software in recent days, cybersecurity researchers have already detected breaches on more than 100 servers representing 60 victims thus far, including organisations in the energy sector, consulting firms and universities. Hackers have also exploited the software to break into the systems of national governments from Europe to the Middle East, according to a person familiar with the matter.

    The SharePoint flaws have been used in hacks since at least 7 July, said Adam Meyers, senior vice president at CrowdStrike Holdings. Early exploitation resembled government-sponsored activity, and then spread more widely to include hacking that “looks like China”, Meyers said. CrowdStrike’s investigation into the campaign is ongoing, he said.

    Microsoft said in its blog that its investigations into other threat actors using these exploits “is still ongoing”. The company said it has “high confidence” that hackers will “continue to integrate them into their attacks”.

    ‘Unfounded speculation’

    In a statement, the Chinese embassy in Washington said China firmly opposes all forms of cyberattacks and cybercrime.

    “At the same time, we also firmly oppose smearing others without solid evidence,” it said. “We hope that relevant parties will adopt a professional and responsible attitude when characterising cyber incidents, basing their conclusions on sufficient evidence rather than unfounded speculation and accusations.”

    No sensitive or classified information is known to have been compromised in the attack on the National Nuclear Security Administration, the person with knowledge of the breach said. The semiautonomous arm of the energy department is responsible for producing and dismantling nuclear arms. Other parts of the department were also compromised.

    Read: SharePoint zero-day hits servers, Microsoft issues emergency alert

    An energy department spokesman said by email that the SharePoint exploitation began affecting the agency on 18 July, but it was limited by the fact that the department uses Microsoft’s cloud.

    Representatives of the US department of education and Rhode Island legislature meanwhile didn’t respond to calls and e-mails seeking comment. The Florida department of revenue said the SharePoint weaknesses were being investigated “at multiple levels of government” but declined further comment.

    The hackers have also breached the systems of a US-based health-care provider and targeted a public university in Southeast Asia, according to a report from a cybersecurity firm reviewed by Bloomberg News. The report doesn’t identify either entity by name, but says the hackers have attempted to breach SharePoint servers in countries including Brazil, Canada, Indonesia, Spain, South Africa, Switzerland, the UK and the US. The firm asked not to be named because of the sensitivity of the information.

    Hackers have stolen sign-in credentials, including usernames, passwords, hash codes and tokens, from some systems, according to a person familiar with the matter, who asked not to be identified discussing sensitive information.

    “This is a high-severity, high-urgency threat,” said Michael Sikorski, chief technology officer and head of threat intelligence for Unit 42 at Palo Alto Networks.

    What makes this especially concerning is SharePoint’s deep integration with Microsoft’s platform

    “What makes this especially concerning is SharePoint’s deep integration with Microsoft’s platform, including their services like Office, Teams, OneDrive and Outlook, which has all the information valuable to an attacker,” he said.

    The cyber firm Eye Security said the flaws allow hackers to access SharePoint servers and steal keys that can let them impersonate users or services even after the server is patched. It said hackers can maintain access through backdoors or modified components that can survive updates and reboots of systems.

    The breaches have drawn new scrutiny to Microsoft’s efforts to shore up its security after a series of high-profile failures. The firm has hired executives from places like the US government and holds weekly meetings with senior executives to make its software more resilient. The company’s tech has been subject to several widespread and damaging hacks in recent years, and a 2024 US government report described the company’s security culture as in need of urgent reforms.

    Not targeted

    Eye Security has detected compromises on more than 100 servers representing 60 victims, including organisations in the energy sector, consulting firms and universities. Victims were also located in Saudi Arabia, Vietnam, Oman and the United Arab Emirates, according to the company.

    In early July, Microsoft issued patches to fix the security holes, but hackers found another way in.

    “There were ways around the patches” that enabled hackers to break into SharePoint servers by tapping into similar vulnerabilities, said Vaisha Bernard, Eye Security’s chief hacker and co-owner. “That allowed these attacks to happen.” The intrusions, he said, were not targeted and instead were aimed at compromising as many victims as possible.

    Read: Microsoft hosts security summit after CrowdStrike disaster

    He declined to identify the identity of organisations that had been targeted, but said they included government agencies and private companies, including “bigger multinationals”. The victims were located in countries in North and South America, the European Union, South Africa and Australia, he said.  — Jake Bleiberg, Ari Natter, Ryan Gallagher and Patrick Howell O’Neill, (c) 2025 Bloomberg LP

    Get breaking news from TechCentral on WhatsApp. Sign up here.

    Don’t miss:

    SharePoint zero-day impact ripples around the world

    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Microsoft Microsoft SharePoint SharePoint
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSim-swap fraud costing South Africa R5.3-billion a year
    Next Article JSE benchmark index tops 100 000 for first time

    Related Posts

    Simplify Microsoft Teams calling with Telviva - Rob Lith

    Simplify Microsoft Teams calling with Telviva

    14 April 2026
    Software rout deepens as AI fears grip investors

    Software rout deepens as AI fears grip investors

    10 April 2026
    Microsoft is sacrificing Edge on the altar of Copilot

    Microsoft is sacrificing Edge on the altar of Copilot

    10 April 2026
    Company News
    Fibre: the backbone of South Africa's digital health ecosystem - Mweb

    Fibre: the backbone of South Africa’s digital health ecosystem

    16 April 2026
    New man to accelerate wholesale connectivity in the DRC - Gaetan Soltesz, FAST Congo

    New man to accelerate wholesale connectivity in the DRC

    15 April 2026
    Avast Business and Avert IT Distribution rewrite the SMB cybersecurity playbook

    Avast Business and Avert IT Distribution rewrite the SMB cybersecurity playbook

    15 April 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Wits project pits African creators against AI music's blind spots

    Wits project pits African creators against AI music’s blind spots

    17 April 2026
    Prosus offloads 4.5% of Delivery Hero to Uber for €270-million

    Prosus offloads 4.5% of Delivery Hero to Uber for €270-million

    17 April 2026
    Numsa digs in for 8% as Eskom wage pact splits unions

    Numsa digs in as Eskom wage pact splits unions

    17 April 2026
    Consumers get new weapon against direct marketing spam

    Consumers get new weapon against phone call spam

    16 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}