Anatomy of a Breach

Anatomy of a Breach: Microsoft SharePoint — Zero-Day Exploited by Three Chinese Groups, 400+ Organisations Compromised Including NNSA

> series: anatomy_of_a_breach —— part: 199 —— target: microsoft_sharepoint —— groups: 3_chinese_apt —— organisations: 400+ —— includes: us_nuclear_security<span class="cursor-blink">_</span>_

Hedgehog Security 31 July 2025 14 min read

SharePoint. Three Chinese groups. 400+ organisations. Including the agency that manages US nuclear weapons.

In July 2025, it was revealed that a zero-day vulnerability in Microsoft SharePoint — the file sharing and collaboration platform used by millions of organisations worldwide — had been exploited by three separate Chinese government-linked hacking groups to compromise over 400 organisations. The victims included the US National Nuclear Security Administration (NNSA), the federal agency responsible for maintaining and developing the US stockpile of nuclear weapons, along with major corporations and sensitive government agencies across multiple countries.

The vulnerability enabled remote code execution against self-hosted SharePoint servers — providing attackers with full access to the files, documents, and data stored on the platform. Even after the vulnerability was publicly disclosed and patches were available, thousands of vulnerable self-hosted SharePoint servers remained online. The SharePoint zero-day was the most significant Microsoft platform vulnerability since the Exchange/Hafnium (2021) mass exploitation event — and raised the same questions about the security implications of concentrating sensitive data in a single Microsoft platform.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

When everyone puts their files in SharePoint, SharePoint becomes the ultimate target.

Nuclear Security Agency Compromised
The compromise of the NNSA — responsible for US nuclear weapons — through a collaboration platform vulnerability demonstrated that the most sensitive government data is accessible through commonly-used enterprise software. For UK organisations in the <a href="/blog/sector-under-the-microscope-defence-supply-chain">defence supply chain</a>, platform security is national security. Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> assesses SharePoint and collaboration platform security.
Three Chinese Groups Simultaneously
Three separate Chinese APT groups exploited the same vulnerability — demonstrating the breadth of Chinese cyber espionage capabilities and the value nation-states place on accessing collaboration platform data. <a href="https://www.cyber-defence.io/services/threat-intelligence">UK Cyber Defence's threat intelligence</a> tracks nation-state campaigns targeting enterprise platforms.
Self-Hosted Servers Remain Vulnerable
Thousands of self-hosted SharePoint servers remained unpatched even after disclosure — the same patching gap pattern documented from <a href="/blog/anatomy-of-a-breach-wannacry">WannaCry</a> (2017) to <a href="/blog/anatomy-of-a-breach-hafnium-exchange">Exchange/Hafnium</a> (2021). <a href="/cyber-essentials">Cyber Essentials Danzell</a> mandates 14-day patching. <a href="/vulnerability-scanning">Vulnerability scanning</a> identifies unpatched SharePoint servers.
Cloud vs Self-Hosted Risk
SharePoint Online (in Microsoft 365) is patched by Microsoft; self-hosted SharePoint servers must be patched by the organisation. The zero-day affected self-hosted deployments — reinforcing the security advantage of cloud-managed platforms where the vendor handles patching. Our <a href="/penetration-testing/cloud-configuration-review">cloud configuration reviews</a> assess platform deployment models and associated risk.

Your collaboration platform holds your secrets. Secure it accordingly.

The SharePoint zero-day proved that collaboration platforms — which hold organisations' most sensitive documents, communications, and intellectual property — are priority targets for nation-state espionage. Cyber Essentials mandates patching and secure configuration. Vulnerability scanning identifies unpatched SharePoint servers. Infrastructure testing assesses collaboration platform security. SOC in a Box monitors for exploitation attempts. And UK Cyber Defence provides incident response when collaboration platforms are compromised.


SharePoint: 400+ organisations compromised including nuclear security. Is your collaboration platform patched?

<a href="/vulnerability-scanning">Vulnerability scanning</a> finds unpatched SharePoint. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> assesses platform security. <a href="/cyber-essentials">Cyber Essentials</a> mandates patching.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles