The FBI said it was aware of the matter. “We are working closely with our federal government and private sector partners,” it said.
“We are seeing attempts to exploit thousands of SharePoint servers globally before a patch is available,” said Pete Renals, a senior manager with Palo Alto Networks’ Unit 42. “We have identified dozens of compromised organisations spanning both commercial and government sectors.”
With access to these servers, which often connect to Outlook email, Teams and other core services, a breach can lead to theft of sensitive data as well as password harvesting, Netherlands-based research company Eye Security noted. What’s also alarming, researchers said, is that the hackers have gained access to keys that may allow them to regain entry even after a system is patched.
“So pushing out a patch on Monday or Tuesday doesn’t help anybody who’s been compromised in the past 72 hours,” said one researcher, who spoke on the condition of anonymity because a federal investigation is ongoing.
It was not immediately clear who is behind the hacking of global reach or what its ultimate goal is. One private research company found the hackers targeting servers in China as well as a state legislature in the eastern United States. Eye Security said it has tracked more than 50 breaches, including at an energy company in a large state and several European government agencies.
At least two US federal agencies have seen their servers breached, according to researchers, who said victim confidentiality agreements prevent them from naming the targets.
One state official in the eastern US said the attackers had “hijacked” a repository of documents provided to the public to help residents understand how their government works. The agency involved can no longer access the material, but it wasn’t clear whether it was deleted.
“We will need to make these documents available again in a different repository,” the official said, speaking on the condition of anonymity to discuss a developing situation.
Such “wiper” attacks are rare, and this one left officials alarmed in other states as word spread. Some security companies said they had not seen deletions in the SharePoint attacks, only the theft of cryptographic keys that would allow the hackers to reenter the servers.
In Arizona, cybersecurity officials were convening with state, local and tribal officials to assess potential vulnerabilities and share information.
“There is definitely a mad scramble across the nation right now,” said one person familiar with the state’s response.
The breaches occurred after Microsoft fixed a security flaw this month. The attackers realised they could use a similar vulnerability, according to the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency.
CISA spokeswoman Marci McCarthy said the agency was alerted to the issue on Friday by a cyber research firm and immediately contacted Microsoft.
Microsoft has been faulted in the past for issuing fixes that are too narrowly designed and leave similar avenues open to attack. The company, one of the largest tech vendors to governments, has had other major stumbles in the past two years, including breaches of its own corporate networks and executives’ emails. A programming flaw in its cloud services also allowed China-backed hackers to steal email from federal officials.
On Friday, Microsoft said it would stop using China-based engineers to support Defence Department cloud-computing programs after a report by investigative outlet ProPublica revealed the practice, prompting Defence Secretary Pete Hegseth to order a review of Pentagon cloud deals.
The nonprofit Centre for Internet Security, which staffs an information-sharing group for state and local governments, notified about 100 organisations that they were vulnerable and potentially compromised, said Randy Rose, the organisation’s vice president. Those warned included public schools and universities.
The process took six hours on Saturday night – much longer than it otherwise would have, because the threat-intelligence and incident-response teams have been cut by 65% as CISA slashed funding, Rose said.
Despite CISA being led by an acting director, as nominee Sean Plankey has not been confirmed, agency officials have been “working around the clock” on the issue, McCarthy said. “No one has been asleep at the wheel.”
Others that were breached included a government agency in Spain, a local agency in Albuquerque and a university in Brazil, security researchers said.
– Patrick Marley, Sarah Ellison and Aaron Schaffer contributed to this report.