logo
#

Latest news with #DinhHoAnhKhoa

Microsoft looking at ‘internal leak' after Chinese hackers exploit SharePoint flaw
Microsoft looking at ‘internal leak' after Chinese hackers exploit SharePoint flaw

Time of India

time26-07-2025

  • Business
  • Time of India

Microsoft looking at ‘internal leak' after Chinese hackers exploit SharePoint flaw

Microsoft is reportedly investigating whether a leak within its Microsoft Active Protections Program (MAPP), an early alert system for cybersecurity companies, allowed alleged Chinese state-backed hackers to exploit vulnerabilities in its SharePoint service before patches were widely available. The development comes after a security fix released by the tech giant earlier this month reportedly failed to fully address a critical flaw in the server software, leading to widespread cyber espionage attempts. 'As part of our standard process, we'll review this incident, find areas to improve, and apply those improvements broadly,' a Microsoft spokesperson was quoted by Bloomberg as saying. Meanwhile, Microsoft told news agency Reuters that it continually evaluates 'the efficacy and security of all of our partner programs and makes the necessary improvements as needed.' How Microsoft SharePoint was hacked Last week, Microsoft acknowledged that at least two alleged Chinese hacking groups, identified as " Linen Typhoon " and " Violet Typhoon ," along with a third China-based entity, were actively exploiting these weaknesses. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like AirSense 11 – Smart tech for deep sleep ResMed Buy Now Undo The vulnerability in question was first publicly demonstrated in May by Dinh Ho Anh Khoa, a researcher with Vietnamese cybersecurity firm Viettel, at the Pwn2Own cybersecurity conference in Berlin. Khoa was awarded $100,000 for his discovery, prompting Microsoft to release an initial patch in July. However, members of the MAPP program had already been notified of these vulnerabilities on June 24, July 3, and July 7, according to Dustin Childs, head of threat awareness for Trend Micro's Zero Day Initiative, which organises Pwn2Own. Microsoft observed exploit attempts beginning July 7. Childs told Reuters that "the likeliest scenario is that someone in the MAPP program used that information to create the exploits." While the specific vendor responsible for a potential leak remains unclear, Childs speculated, "since many of the exploit attempts come from China, it seems reasonable to speculate it was a company in that region." Nvidia Makes History: First Company to Hit $4 Trillion Market Cap AI Masterclass for Students. Upskill Young Ones Today!– Join Now

Microsoft probing if Chinese hackers learned SharePoint flaws through alert: Reports
Microsoft probing if Chinese hackers learned SharePoint flaws through alert: Reports

Indian Express

time26-07-2025

  • Business
  • Indian Express

Microsoft probing if Chinese hackers learned SharePoint flaws through alert: Reports

Microsoft is investigating whether a leak from its early alert system for cybersecurity companies allowed Chinese hackers to exploit flaws in its SharePoint service before they were patched, Bloomberg News reported on Friday. A security patch Microsoft released this month failed to fully fix a critical flaw in the U.S. tech giant's SharePoint server software, opening the door to a sweeping global cyber espionage effort. In a blog post on Tuesday, Microsoft said two allegedly Chinese hacking groups, dubbed 'Linen Typhoon' and 'Violet Typhoon,' were exploiting the weaknesses, along with a third, also based in China. The tech giant is probing if a leak from the Microsoft Active Protections Program (MAPP) led to the widespread exploitation of vulnerabilities in its SharePoint software globally over the past several days, the report said. Microsoft said in a statement provided to Reuters that the company continually evaluates 'the efficacy and security of all of our partner programs and makes the necessary improvements as needed.' A researcher with Vietnamese cybersecurity firm Viettel demonstrated the SharePoint vulnerability in May at the Pwn2Own cybersecurity conference in Berlin. The conference, put on by cybersecurity company Trend Micro's Zero Day Initiative, rewards researchers in the pursuit of ethically disclosing software vulnerabilities. The researcher, Dinh Ho Anh Khoa, was awarded $100,000 and Microsoft issued an initial patch for the vulnerability in July, but members of the MAPP program were notified of the vulnerabilities on June 24, July 3 and July 7, Dustin Childs, head of threat awareness for the Zero Day Initiative at Trend Micro, told Reuters Friday. Microsoft first observed exploit attempts on July 7, the company said in the Tuesday blog post. Childs told Reuters that 'the likeliest scenario is that someone in the MAPP program used that information to create the exploits.' It's not clear which vendor was responsible, Childs said, 'but since many of the exploit attempts come from China, it seems reasonable to speculate it was a company in that region.' It would not be the first time that a leak from the MAPP program led to a security breach. More than a decade ago, Microsoft accused a Chinese firm, Hangzhou DPTech Technologies Co., Ltd., of breaching its non-disclosure agreement and expelled it from the program. 'We recognize that there is the potential for vulnerability information to be misused,' Microsoft said in a 2012 blog post, around the time that information first leaked from the program. 'In order to limit this as much as possible, we have strong non-disclosure agreements (NDA) with our partners. Microsoft takes breaches of its NDAs very seriously.' Any confirmed leak from MAPP would be a blow to the program, which is meant to give cyber defenders the upper hand against hackers who race to parse Microsoft updates for clues on how to develop malicious software that can be used against still-vulnerable users. Launched in 2008, MAPP was meant to give trusted security vendors a head start against the hackers, for example, by supplying them with detailed technical information and, in some cases, 'proof of concept' software that mimics the operation of genuine malware.

Microsoft probing if Chinese hackers learned SharePoint flaws through alert: Report
Microsoft probing if Chinese hackers learned SharePoint flaws through alert: Report

Economic Times

time26-07-2025

  • Business
  • Economic Times

Microsoft probing if Chinese hackers learned SharePoint flaws through alert: Report

Reuters Microsoft is investigating whether a leak from its early alert system for cybersecurity companies allowed Chinese hackers to exploit flaws in its SharePoint service before they were patched, Bloomberg News reported on Friday. A security patch Microsoft released this month failed to fully fix a critical flaw in the U.S. tech giant's SharePoint server software, opening the door to a sweeping global cyber espionage effort. In a blog post on Tuesday, Microsoft said two allegedly Chinese hacking groups, dubbed "Linen Typhoon" and "Violet Typhoon," were exploiting the weaknesses, along with a third, also based in China. The tech giant is probing if a leak from the Microsoft Active Protections Program (MAPP) led to the widespread exploitation of vulnerabilities in its SharePoint software globally over the past several days, the report said. Microsoft said in a statement provided to Reuters that the company continually evaluates "the efficacy and security of all of our partner programs and makes the necessary improvements as needed." A researcher with Vietnamese cybersecurity firm Viettel demonstrated the SharePoint vulnerability in May at the Pwn2Own cybersecurity conference in Berlin. The conference, put on by cybersecurity company Trend Micro's Zero Day Initiative, rewards researchers in the pursuit of ethically disclosing software vulnerabilities. The researcher, Dinh Ho Anh Khoa, was awarded $100,000 and Microsoft issued an initial patch for the vulnerability in July, but members of the MAPP program were notified of the vulnerabilities on June 24, July 3 and July 7, Dustin Childs, head of threat awareness for the Zero Day Initiative at Trend Micro, told Reuters Friday. Microsoft first observed exploit attempts on July 7, the company said in the Tuesday blog post. Childs told Reuters that "the likeliest scenario is that someone in the MAPP program used that information to create the exploits." It's not clear which vendor was responsible, Childs said, "but since many of the exploit attempts come from China, it seems reasonable to speculate it was a company in that region." It would not be the first time that a leak from the MAPP program led to a security breach. More than a decade ago, Microsoft accused a Chinese firm, Hangzhou DPTech Technologies Co., Ltd., of breaching its non-disclosure agreement and expelled it from the program. "We recognize that there is the potential for vulnerability information to be misused," Microsoft said in a 2012 blog post, around the time that information first leaked from the program. "In order to limit this as much as possible, we have strong non-disclosure agreements (NDA) with our partners. Microsoft takes breaches of its NDAs very seriously." Any confirmed leak from MAPP would be a blow to the program, which is meant to give cyber defenders the upper hand against hackers who race to parse Microsoft updates for clues on how to develop malicious software that can be used against still-vulnerable users. Launched in 2008, MAPP was meant to give trusted security vendors a head start against the hackers, for example, by supplying them with detailed technical information and, in some cases, "proof of concept" software that mimics the operation of genuine malware. Elevate your knowledge and leadership skills at a cost cheaper than your daily tea. Paid less than plumbers? The real story of freshers' salaries at Infy, TCS. Can medicines inject the vitamins Amazon is missing? Can victims of Jane Street scam be compensated by investor protection funds? We prefer to have idle pilots than grounded planes: Akasa CFO on losses, funding hiccups, Boeing What if Tata Motors buys Iveco's truck unit? Will it propel or drag like JLR? How private ARCs are losing out to a govt-backed firm dealing in bad loans Stock picks of the week: 5 stocks with consistent score improvement and return potential of 13 to 45% in 1 year Short-term valuation headwinds? Yes. Long-term growth potential intact? Yes. Which 'Yes' is more relevant? F&O Radar| Deploy Bull Call Spread in Nifty to gain from a 'buy-on-dips' stance

Microsoft Hack Victims Need to Be on Alert for Sleeper Cells
Microsoft Hack Victims Need to Be on Alert for Sleeper Cells

Bloomberg

time24-07-2025

  • Business
  • Bloomberg

Microsoft Hack Victims Need to Be on Alert for Sleeper Cells

In May, Vietnamese cybersecurity researcher Dinh Ho Anh Khoa uncovered a vulnerability in Microsoft Corp.'s document management software, SharePoint, at an event designed to encourage ethical hacking that makes our technology more robust. He received $100,000 from Trend Micro, the security group that sponsored the event. As part of the deal, flaws discovered in these competitions must be kept under wraps to give affected companies time to assess the threat, work on a fix, test it and then release it. In this case, Microsoft released its patch by July 8 — a reasonable timeframe, cybersecurity experts say, given there had been no indication the hack had been used 'in the wild' until July 7.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store