logo
Risk highlighted as Chinese hackers hit Microsoft

Risk highlighted as Chinese hackers hit Microsoft

Arab News3 days ago
PARIS : Software giant Microsoft is at the center of cybersecurity storm after China-linked hackers exploited flaws in SharePoint servers to target hundreds of organizations.
While such cyberattacks are not new, the scale of the onslaught and the speed with which the hackers took advantage of freshly discovered vulnerabilities is fueling concern.
Dutch startup Eye Security warned Saturday of online attacks targeting SharePoint file-sharing servers, with Microsoft quick to confirm the report and release patches to protect systems.
The vulnerability allowed hackers to retrieve credentials and then access SharePoint servers kept at users' facilities, according to Microsoft.
Cloud-based SharePoint software was safe from the problem, the company said.
Eye Security determined that more than 400 computer systems were compromised by hackers during waves of attacks.
Targets included government organizations in Europe, the Middle East and the United States — among them the US nuclear weapons agency, media reports indicated.
'On-premises SharePoint deployments — particularly within government, schools, health care and large enterprise companies — are at immediate risk,' cybersecurity firm Palo Alto Networks warned in a note.
Microsoft has not disclosed the number of victims in the attacks.
SharePoint had more than 200 million active users as of 2020, according to the most recent figures available from Microsoft.
Microsoft has attributed the cyberattacks to groups backed by China.
The culprits are believed to include Chinese state actors known as Linen Typhoon and Violet Typhoon along with a group called Storm-2603 which 'is considered with moderate confidence to be a threat actor based in China.'
The Typhoon groups have been active for a decade or more, and are known for intellectual property theft as well as espionage, according to Microsoft.
Less was known about Storm-2603 and its motives.
'Investigations into other actors also using these exploits are ongoing,' Microsoft said, urging users to patch SharePoint servers to avoid becoming hacking victims.
Cybersecurity specialist Damien Bancal noted in a recent blog post that he found 'ready-to-use exploit code' for the vulnerability at a popular website.
The assault on SharePoint servers is the latest in a series of sophisticated attacks carried out by state-sponsored groups against 'the Microsoft ecosystem,' according to Bancal.
In 2021, attacks by a Chinese hacker group known as Silk Typhoon compromised tens of thousands of email servers using Microsft Exchange software.
Microsoft's success at making its software commonplace in offices and homes also makes it a prime target for hackers out to steal money or information.
Microsoft software can hold sensitive and valuable information.
'It's not Microsoft that is being targeted, it's its customers,' said Shane Barney, head of information security at US-based Keeper.
Targeting Microsoft programs is a means to an end, and tomorrow it could be software from another company, said Rodrigue Le Bayon, head of Orange Cyberdefense computer emergency response team.
China is not the only nation backing hacker operations as countries around the world hone cyber capabilities, according to Le Bayon.
Nevertheless, China is repeatedly singled out by companies and goverments hit by hacks.
Western countries have accused hacker groups allegedly supported by China of conducting a global cyber espionage campaign against figures critical of Beijing, democratic institutions, and companies in various sensitive sectors.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

US says tariff deadline of August 1 is firm, no extensions
US says tariff deadline of August 1 is firm, no extensions

Al Arabiya

time2 hours ago

  • Al Arabiya

US says tariff deadline of August 1 is firm, no extensions

The US deadline of August 1 for imposing tariffs on its trading partners is firm and there will be no extensions, Commerce Secretary Howard Lutnick said Sunday. 'So no extensions, no more grace periods. August 1, the tariffs are set. They'll go into place. Customs will start collecting the money, and off we go,' Lutnick told 'Fox News Sunday.' For all the latest headlines follow our Google News channel online or via the app. After the levies kick in, President Donald Trump – who was negotiating Sunday in Scotland with European Union officials – is still willing to keep talking, Lutnick said. Of the Europeans, Lutnick said, 'You know they're hoping they make a deal, and it's up to President Trump, who's the leader of this negotiating table. We set the table.' So far five countries have struck deals with the Trump administration ahead of the Friday deadline as it tries to overhaul the global system of largely free trade by slapping tariffs on countries that the United States deems as engaging in unfair practices. These five are Britain, Vietnam, Indonesia the Philippines, and Japan. The levies they accepted are often higher than the new base rate of 10 percent that the United States has applied to most countries since April. But they are far below the levels the Trump administration threatened to impose if no deal were reached.

The Tea app was intended to help women date safely. Then it got hacked
The Tea app was intended to help women date safely. Then it got hacked

Al Arabiya

timea day ago

  • Al Arabiya

The Tea app was intended to help women date safely. Then it got hacked

Tea, a provocative dating app designed to let women anonymously ask or warn each other about men they'd encountered, rocketed to the top spot on the US Apple App Store this week. On Friday, the company behind the app confirmed it had been hacked: Thousands of images, including selfies, were leaked online. 'We have engaged third-party cybersecurity experts and are working around the clock to secure our systems,' San Francisco-based Tea Dating Advice Inc. said in a statement. The app and the breach highlight the fraught nature of seeking romance in the age of social media. Here's what to know: Tea was meant to help women date safely. Tea founder Sean Cook, a software engineer who previously worked at Salesforce and Shutterfly, says on the app's website that he founded the company in 2022 after witnessing his own mother's terrifying experiences. Cook said they included unknowingly dating men with criminal records and being catfished – deceived by men using false identities. Tea markets itself as a safe way for women to anonymously vet men they might meet on dating apps such as Tinder or Bumble – ensuring that the men are who they say they are, not criminals, and not already married or in a relationship. It's been compared to the Yelp of dating. In an Apple Store review, one woman wrote that she used a Tea search to investigate a man she'd begun talking to and discovered over 20 red flags, including serious allegations like assault and recording women without their consent. She said she cut off communication. 'I can't imagine how things could've gone had I not known,' she wrote. A surge in social media attention over the past week pushed Tea to the No. 1 spot at the US Apple Store as of July 24, according to Sensor Tower, a research firm. In the seven days from July 17-23, Tea downloads shot up 525 percent compared to the week before. Tea said in an Instagram post that it had reached 4 million users. Tea has been criticized for invading men's privacy. A female columnist for The Times of London newspaper who signed into the app on Thursday called Tea a 'man-shaming' site and complained that 'this is simply vigilante justice entirely reliant on the scruples of anonymous women.' 'With Tea on the scene, what man would ever dare date a woman again?' It's unclear what legal recourse an aggrieved man might have if he feels he's been defamed or had his privacy violated on Tea or a similar social media platform. In May, a federal judge in Illinois threw out an invasion-of-privacy lawsuit by a man who'd been criticized by women in the Facebook chat group 'Are We Dating the Same Guy,' Bloomberg Law reported. The breach exposed thousands of selfies and photo IDs. In its statement, Tea reported that about 72,000 images were leaked online, including 13,000 images of selfies or photo identification that users submitted during account verification. Another 59,000 images that were publicly viewable in the app from posts, comments, and direct messages were also accessed, according to the company's statement. No email addresses or phone numbers were exposed, the company said, and the breach only affects users who signed up before February 2024. 'At this time, there is no evidence to suggest that additional user data was affected. Protecting Tea users' privacy and data is our highest priority,' Tea said. It said users did not need to change their passwords or delete their accounts. 'All data has been secured.'

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store