Two other responders working with the US Government said they had identified early attacks from China as well. The Chinese Embassy in Washington did not immediately respond to a request for comment.
The attacks allowed hackers to extract cryptographic keys from servers run by Microsoft clients. Those keys, in turn, would let them install anything, including back doors that they could use to return.
Federal and state agencies were affected, researchers previously told the Washington Post, but it remains unclear which of them were vulnerable to follow-up attacks.
Only versions of SharePoint that are hosted by the customer, not those in the cloud, are vulnerable. Microsoft issued effective patches for the last of the exposed versions by today.
While installing the patches should prevent new intrusions, customers also need to change the machine’s digital keys, apply anti-malware software and hunt for any breaches that have already occurred, Microsoft said.
Some of the early targets of the attack were entities that would interest the Chinese Government, two of the responders said.
But a wide range of attackers were now trying similar grabs, others said, looking to steal corporate secrets or install ransomware that encrypts key files until payments are made.
“It’s critical to understand that multiple actors are now actively exploiting this vulnerability. We fully anticipate that this trend will continue, as various other threat actors, driven by diverse motivations, will leverage this exploit as well,” Carmakal said.
Piet Kerkhofs, CTO and co-founder of Europe-based Eye Security, said the SharePoint breaches share characteristics with other compromises that security researchers have attributed to China-based hackers.
For instance, hackers this month exploited a vulnerability in Citrix’s NetScaler virtual desktop that some researchers saw being used by Chinese actors, Kerkhofs said.
That hack was similar to the SharePoint compromise in that it turned a freshly discovered vulnerability into an “exploit” or weapon - in “extremely fast” order, “hours to days”, he said.
Another instance was China’s global compromise of Microsoft Exchange email servers in early 2021. That case involved hackers sponsored by the Chinese Government conducting widespread exploitation of core Microsoft software - its Exchange email server software.
That breach has been attributed to a group that Microsoft calls Silk Typhoon, which is linked to China’s Ministry of State Security.
It is one of the most technically advanced hacking groups in the world and has been striking sensitive US targets at an increased rate in the past year, the Washington Post reported last week.
Silk Typhoon has broken into multiple US federal agencies in the past and more recently hit multiple ministries in Europe, the Washington Post reported.