By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
AIModelKitAIModelKitAIModelKit
  • Home
  • News
    NewsShow More
    Google Launches Gemini Personal Intelligence Feature in India: What You Need to Know
    Google Launches Gemini Personal Intelligence Feature in India: What You Need to Know
    4 Min Read
    Sam Altman Targeted Again in Recent Attack: What You Need to Know
    Sam Altman Targeted Again in Recent Attack: What You Need to Know
    4 Min Read
    OpenAI Acquires AI Personal Finance Startup Hiro: What This Means for the Future
    OpenAI Acquires AI Personal Finance Startup Hiro: What This Means for the Future
    5 Min Read
    Microsoft Develops New OpenClaw-like AI Agent: What to Expect
    Microsoft Develops New OpenClaw-like AI Agent: What to Expect
    4 Min Read
    Microsoft Tests OpenClaw-Inspired AI Bots for Enhanced Copilot Functionality
    Microsoft Tests OpenClaw-Inspired AI Bots for Enhanced Copilot Functionality
    4 Min Read
  • Open-Source Models
    Open-Source ModelsShow More
    Pioneering the Future of Computer Use: Expanding Digital Frontiers
    Pioneering the Future of Computer Use: Expanding Digital Frontiers
    5 Min Read
    Protecting Cryptocurrency: How to Responsibly Disclose Quantum Vulnerabilities
    Protecting Cryptocurrency: How to Responsibly Disclose Quantum Vulnerabilities
    4 Min Read
    Boosting AI and XR Prototyping Efficiency with XR Blocks and Gemini
    Boosting AI and XR Prototyping Efficiency with XR Blocks and Gemini
    5 Min Read
    Transforming News Reports into Data Insights with Gemini: A Comprehensive Guide
    Transforming News Reports into Data Insights with Gemini: A Comprehensive Guide
    6 Min Read
    Enhancing Urban Safety: AI-Powered Flash Flood Forecasting Solutions for Cities
    Enhancing Urban Safety: AI-Powered Flash Flood Forecasting Solutions for Cities
    5 Min Read
  • Guides
    GuidesShow More
    Could AI Agents Become Your Next Security Threat?
    Could AI Agents Become Your Next Security Threat?
    6 Min Read
    Master Python Continuous Integration and Deployment with GitHub Actions: Take the Real Python Quiz
    Master Python Continuous Integration and Deployment with GitHub Actions: Take the Real Python Quiz
    3 Min Read
    Exploring the Role of Data Generalists: Why Range is More Important than Depth
    Exploring the Role of Data Generalists: Why Range is More Important than Depth
    6 Min Read
    Master Python Protocols: Take the Ultimate Quiz with Real Python
    Master Python Protocols: Take the Ultimate Quiz with Real Python
    4 Min Read
    Mastering Input and Output in Python: Quiz from Real Python
    Mastering Input and Output in Python: Quiz from Real Python
    3 Min Read
  • Tools
    ToolsShow More
    Safetensors Partners with PyTorch Foundation: Strengthening AI Development
    Safetensors Partners with PyTorch Foundation: Strengthening AI Development
    5 Min Read
    High Throughput Computer Use Agent: Understanding 12B for Optimal Performance
    High Throughput Computer Use Agent: Understanding 12B for Optimal Performance
    5 Min Read
    Introducing the First Comprehensive Healthcare Robotics Dataset and Essential Physical AI Models for Advancing Healthcare Robotics
    Introducing the First Comprehensive Healthcare Robotics Dataset and Essential Physical AI Models for Advancing Healthcare Robotics
    6 Min Read
    Creating Native Multimodal Agents with Qwen 3.5 VLM on NVIDIA GPU-Accelerated Endpoints
    Creating Native Multimodal Agents with Qwen 3.5 VLM on NVIDIA GPU-Accelerated Endpoints
    5 Min Read
    Discover SyGra Studio: Your Gateway to Exceptional Creative Solutions
    Discover SyGra Studio: Your Gateway to Exceptional Creative Solutions
    6 Min Read
  • Events
    EventsShow More
    Navigating the ESSER Cliff: Key Reasons Education Company Leaders are Attending the 2026 EdExec Summit
    Navigating the ESSER Cliff: Key Reasons Education Company Leaders are Attending the 2026 EdExec Summit
    6 Min Read
    Exploring National Robotics Week: Key Physical AI Research Breakthroughs and Essential Resources
    Exploring National Robotics Week: Key Physical AI Research Breakthroughs and Essential Resources
    5 Min Read
    Developing a Comprehensive Four-Part Professional Development Series on AI Education
    Developing a Comprehensive Four-Part Professional Development Series on AI Education
    6 Min Read
    NVIDIA and Thinking Machines Lab Forge Strategic Gigawatt-Scale Partnership for Long-Term Innovation
    NVIDIA and Thinking Machines Lab Forge Strategic Gigawatt-Scale Partnership for Long-Term Innovation
    5 Min Read
    ABB Robotics Utilizes NVIDIA Omniverse for Scalable Industrial-Grade Physical AI Solutions
    ABB Robotics Utilizes NVIDIA Omniverse for Scalable Industrial-Grade Physical AI Solutions
    5 Min Read
  • Ethics
    EthicsShow More
    Examining Demographic Bias in LLM-Generated Targeted Messages: An Audit Study
    Examining Demographic Bias in LLM-Generated Targeted Messages: An Audit Study
    4 Min Read
    Meta Faces Warning: Facial Recognition Glasses Could Empower Sexual Predators
    Meta Faces Warning: Facial Recognition Glasses Could Empower Sexual Predators
    5 Min Read
    How Increased Job Commodification Makes Your Role More Susceptible to AI: Insights from Online Freelancing
    How Increased Job Commodification Makes Your Role More Susceptible to AI: Insights from Online Freelancing
    6 Min Read
    Exclusive Jeff VanderMeer Story & Unreleased AI Models: The Download You Can’t Miss
    Exclusive Jeff VanderMeer Story & Unreleased AI Models: The Download You Can’t Miss
    5 Min Read
    Exploring Psychological Learning Paradigms: Their Impact on Shaping and Constraining Artificial Intelligence
    Exploring Psychological Learning Paradigms: Their Impact on Shaping and Constraining Artificial Intelligence
    4 Min Read
  • Comparisons
    ComparisonsShow More
    Understanding Abstention Through Selective Help-Seeking: A Comprehensive Model
    Understanding Abstention Through Selective Help-Seeking: A Comprehensive Model
    5 Min Read
    Enhancing Mission-Critical Small Language Models through Multi-Model Synthetic Training: Insights from Research 2509.13047
    Enhancing Mission-Critical Small Language Models through Multi-Model Synthetic Training: Insights from Research 2509.13047
    4 Min Read
    Google Launches Gemma 4: Emphasizing Local-First, On-Device AI Inference for Enhanced Performance
    Google Launches Gemma 4: Emphasizing Local-First, On-Device AI Inference for Enhanced Performance
    5 Min Read
    Overcoming Limitations of Discrete Neuronal Attribution in Neuroscience
    Overcoming Limitations of Discrete Neuronal Attribution in Neuroscience
    5 Min Read
    Optimizing Bandwidth for Cooperative Multi-Agent Reinforcement Learning: Variational Message Encoding Techniques
    Optimizing Bandwidth for Cooperative Multi-Agent Reinforcement Learning: Variational Message Encoding Techniques
    4 Min Read
Search
  • Privacy Policy
  • Terms of Service
  • Contact Us
  • FAQ / Help Center
  • Advertise With Us
  • Latest News
  • Model Comparisons
  • Tutorials & Guides
  • Open-Source Tools
  • Community Events
© 2025 AI Model Kit. All Rights Reserved.
Reading: Chinese Hackers Breach 400 Organizations, Including US Nuclear Weapons Agency, Reports Microsoft
Share
Notification Show More
Font ResizerAa
AIModelKitAIModelKit
Font ResizerAa
  • 🏠
  • 🚀
  • 📰
  • 💡
  • 📚
  • ⭐
Search
  • Home
  • News
  • Models
  • Guides
  • Tools
  • Ethics
  • Events
  • Comparisons
Follow US
  • Latest News
  • Model Comparisons
  • Tutorials & Guides
  • Open-Source Tools
  • Community Events
© 2025 AI Model Kit. All Rights Reserved.
AIModelKit > News > Chinese Hackers Breach 400 Organizations, Including US Nuclear Weapons Agency, Reports Microsoft
News

Chinese Hackers Breach 400 Organizations, Including US Nuclear Weapons Agency, Reports Microsoft

aimodelkit
Last updated: July 27, 2025 1:00 pm
aimodelkit
Share
Chinese Hackers Breach 400 Organizations, Including US Nuclear Weapons Agency, Reports Microsoft
SHARE

Recent Cybersecurity Breaches: Microsoft Alerts on Vulnerabilities in SharePoint

In a recent announcement, Microsoft has revealed concerning findings regarding security vulnerabilities in its SharePoint document-sharing servers. The tech giant has attributed these breaches to Chinese “threat actors,” including state-sponsored hackers. Research from Dutch cybersecurity firm Eye Security indicates that several hundred organizations, including over 400 government agencies and private entities, have fallen victim to these cyberattacks, primarily within the United States.

Contents
  • Scale of the Breach
  • Identified Threat Groups
  • Nature of the Vulnerabilities
  • Recommendations for Users
  • Coordinated Exploitation Campaign
  • Focus of Threat Groups
  • Implications for Future Security Measures

Scale of the Breach

Eye Security’s findings paint a troubling picture of the current cybersecurity landscape. The firm reports that this vulnerability exploitation may continue to escalate as investigations unfold. Notably, entities such as the National Nuclear Security Administration—the U.S. agency responsible for overseeing the country’s nuclear weapon stockpile—have reported breaches, showcasing the severe implications of these attacks on national security.

Identified Threat Groups

Microsoft has identified three notable groups involved in these attacks: Linen Typhoon, Violet Typhoon, and Storm-2603. The first two are recognized as state-backed entities targeting sensitive governmental and defense information, while Storm-2603 is believed to be based in China but lacks established connections to the other two groups. These hackers have exploited “newly disclosed security vulnerabilities” aimed at remote internet-facing servers running SharePoint.

Nature of the Vulnerabilities

The vulnerabilities specifically impact on-premises SharePoint servers—widely used platforms for document storage and collaboration among organizations. Microsoft has emphasized that the lapse does not pertain to its cloud-based SharePoint services, which are less targeted in this instance. This distinction is crucial for companies relying on Microsoft’s cloud offerings versus those with on-premises systems that may remain exposed.

The security flaws allow attackers to spoof authentication credentials, executing malicious code remotely. Beginning as early as July 7th, the perpetrators aimed to gain initial access to various targeted organizations by leveraging these vulnerabilities. Reports indicate that attackers have successfully sent requests enabling the theft of critical key materials from SharePoint servers.

More Read

How DOGE’s Technological Advancements Could Compromise the Security and Stability of Our Critical Data
How DOGE’s Technological Advancements Could Compromise the Security and Stability of Our Critical Data
Revolutionary Sodium Metal Fuel Cell: A Game Changer for Cleaner Transportation Solutions
Tesla Falls Short on Commitment to Produce 5,000 Optimus Bots by Year-End
Supporting Cancer Survivors in Parenthood and Revitalizing Bangladesh’s Garment Industry
Trump Administration Targets Biden and Obama-Era Cybersecurity Regulations

Recommendations for Users

In light of these attacks, Microsoft has released security updates and urged all users operating on-premises SharePoint systems to implement these patches immediately. The company holds a “high confidence” assessment that these hacking groups will persist in targeting unpatched vulnerabilities, underscoring the urgency for organizations to stay vigilant and proactive in securing their systems.

Coordinated Exploitation Campaign

Eye Security observed “unusual activity” on a client’s on-premises SharePoint server on July 18th, prompting a review of over 8,000 accessible SharePoint servers globally. This investigation confirmed numerous compromised systems amidst a coordinated mass exploitation campaign. Such trends indicate a growing sophistication in how state-sponsored adversaries are executing their operations.

Focus of Threat Groups

The motivations behind these attacks provide further insight into the strategic objectives of these threat actors. Linen Typhoon has been known for targeting intellectual property, particularly zeroing in on areas like government, defense, strategic planning, and human rights since 2012. On the other hand, Violet Typhoon has focused primarily on espionage activities related to former government officials, military personnel, non-profit organizations, think tanks, and various sectors across the U.S., Europe, and East Asia.

Implications for Future Security Measures

Microsoft’s findings paint a stark picture of the evolving threat landscape in cybersecurity. With additional actors possibly looking to exploit unpatched on-premises SharePoint systems, organizations must prioritize implementing security updates and remain informed on emerging vulnerabilities. The convergence of geopolitical tensions and cybersecurity risks makes it crucial for companies to reassess their information security strategies.

As companies worldwide enhance their defenses against these persistent threats, the agglomeration of firms scaling back their operations in China, such as Microsoft and IBM, reflects heightened scrutiny over U.S. enterprises engaging in AI-related projects within the region. With shifts in the international balance and rising concerns over espionage, the tech landscape is poised for considerable change.

Security is no longer merely a technical issue; it has become a fundamental component of an organization’s strategic operations. As announcements from major tech firms continue to elucidate cybersecurity threats, organizations must adapt, fortify their defenses, and remain vigilant against evolving strategies employed by malicious actors.

Inspired by: Source

OpenAI and Anthropic Implement Age Prediction Tools to Safeguard Underage Users
OpenAI Prepares for the Launch of GPT-4.1: What to Expect
Google Unveils New AI Model and Website for Accurate Tropical Storm Forecasting
Oura Introduces AI-Enhanced Glucose Tracking and Meal Logging Features
How Humanities Play a Crucial Role in Shaping the Future of AI

Sign Up For Daily Newsletter

Get AI news first! Join our newsletter for fresh updates on open-source models.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Previous Article Indian Film Company to Rerelease Romantic Drama Featuring AI-Enhanced Happy Ending Indian Film Company to Rerelease Romantic Drama Featuring AI-Enhanced Happy Ending
Next Article DOGE Develops AI Tool to Simplify Federal Regulations DOGE Develops AI Tool to Simplify Federal Regulations

Stay Connected

XFollow
PinterestPin
TelegramFollow
LinkedInFollow

							banner							
							banner
Explore Top AI Tools Instantly
Discover, compare, and choose the best AI tools in one place. Easy search, real-time updates, and expert-picked solutions.
Browse AI Tools

Latest News

Examining Demographic Bias in LLM-Generated Targeted Messages: An Audit Study
Examining Demographic Bias in LLM-Generated Targeted Messages: An Audit Study
Ethics
Google Launches Gemini Personal Intelligence Feature in India: What You Need to Know
Google Launches Gemini Personal Intelligence Feature in India: What You Need to Know
News
Understanding Abstention Through Selective Help-Seeking: A Comprehensive Model
Understanding Abstention Through Selective Help-Seeking: A Comprehensive Model
Comparisons
Could AI Agents Become Your Next Security Threat?
Could AI Agents Become Your Next Security Threat?
Guides
//

Leading global tech insights for 20M+ innovators

Quick Link

  • Latest News
  • Model Comparisons
  • Tutorials & Guides
  • Open-Source Tools
  • Community Events

Support

  • Privacy Policy
  • Terms of Service
  • Contact Us
  • FAQ / Help Center
  • Advertise With Us

Sign Up for Our Newsletter

Get AI news first! Join our newsletter for fresh updates on open-source models.

AIModelKitAIModelKit
Follow US
© 2025 AI Model Kit. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?