{"id":669552,"date":"2025-07-22T23:08:01","date_gmt":"2025-07-23T03:08:01","guid":{"rendered":"https:\/\/goldtadise.com\/?p=669552"},"modified":"2025-07-22T23:08:01","modified_gmt":"2025-07-23T03:08:01","slug":"china-backed-hackers-used-microsoft-flaw-in-attacks-defenders-say","status":"publish","type":"post","link":"https:\/\/goldtadise.com\/?p=669552","title":{"rendered":"China-backed hackers used Microsoft flaw in attacks, defenders say"},"content":{"rendered":"<h4>Researchers say Chinese and other criminal hackers have exploited a security flaw in SharePoint software widely used by governments and businesses \u2014 and may come back.<\/h4>\n<p>Hackers connected to the Chinese government were behind at least some of the widespread attacks in the past few days on organizations that use collaboration software from Microsoft, defenders working on the intrusions said in interviews.<\/p>\n<p>The breaches in the United States and other countries took advantage of a disastrous security flaw that drew attention this month, after Microsoft issued a patch that fixed only part of the problem in SharePoint, which is widely used to coordinate work on documents and projects.<\/p>\n<p>\u201cWe assess that at least one of the actors responsible for this early exploitation is a China-nexus threat actor,\u201d said Charles Carmakal, chief technology officer of Google\u2019s Mandiant Consulting.<\/p>\n<p>That breach has been attributed to group that Microsoft calls Silk Typhoon, which is linked to China\u2019s Ministry of State Security. It is one of the most technically advanced hacking groups in the world and has been striking sensitive U.S. targets at an increased rate in the past year, The Post reported last week.<\/p>\n<p><a href=\"https:\/\/archive.is\/bnUrf#selection-697.0-701.11\">https:\/\/archive.is\/bnUrf#selection-697.0-701.11<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers say Chinese and other criminal hackers have exploited a security flaw in SharePoint software widely used by governments and businesses \u2014 and may come back. Hackers connected to the Chinese government were behind at least some of the widespread &hellip; <a href=\"https:\/\/goldtadise.com\/?p=669552\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2948,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-669552","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/goldtadise.com\/index.php?rest_route=\/wp\/v2\/posts\/669552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/goldtadise.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/goldtadise.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/goldtadise.com\/index.php?rest_route=\/wp\/v2\/users\/2948"}],"replies":[{"embeddable":true,"href":"https:\/\/goldtadise.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=669552"}],"version-history":[{"count":1,"href":"https:\/\/goldtadise.com\/index.php?rest_route=\/wp\/v2\/posts\/669552\/revisions"}],"predecessor-version":[{"id":669553,"href":"https:\/\/goldtadise.com\/index.php?rest_route=\/wp\/v2\/posts\/669552\/revisions\/669553"}],"wp:attachment":[{"href":"https:\/\/goldtadise.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=669552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/goldtadise.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=669552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/goldtadise.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=669552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}