<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Chinese Hackers Archives - Amynicole</title>
	<atom:link href="https://amynicole.co/tag/chinese-hackers/feed/" rel="self" type="application/rss+xml" />
	<link>https://amynicole.co/tag/chinese-hackers/</link>
	<description>Creative projects, Lifestyle insights, and Inspiring content</description>
	<lastBuildDate>Fri, 01 Aug 2025 07:13:14 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://amynicole.co/wp-content/uploads/2024/08/amynicole-puv-150x150.jpg</url>
	<title>Chinese Hackers Archives - Amynicole</title>
	<link>https://amynicole.co/tag/chinese-hackers/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Microsoft Says Chinese Hackers Breached Its Servers</title>
		<link>https://amynicole.co/general/microsoft-says-chinese-hackers-breached-its-servers/838/</link>
		
		<dc:creator><![CDATA[setnis]]></dc:creator>
		<pubDate>Fri, 01 Aug 2025 07:13:13 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Chinese Hackers]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid isPermaLink="false">https://amynicole.co/?p=838</guid>

					<description><![CDATA[<p>amynicole – Microsoft has confirmed that several Chinese-linked hacking groups exploited vulnerabilities in its on-premises SharePoint servers. These servers are widely used by businesses and government entities for internal collaboration and&#8230;</p>
<p>The post <a href="https://amynicole.co/general/microsoft-says-chinese-hackers-breached-its-servers/838/">Microsoft Says Chinese Hackers Breached Its Servers</a> appeared first on <a href="https://amynicole.co">Amynicole</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong><a href="https://amynicole.co/"><em>amynicole</em></a></strong> – Microsoft has confirmed that several Chinese-linked hacking groups exploited vulnerabilities in its on-premises SharePoint servers. These servers are widely used by businesses and government entities for internal collaboration and data management. The affected groups include state-backed actors such as Linen Typhoon and Violet Typhoon, along with another known as Storm-2603. Microsoft stated that the breaches did not affect its cloud-based services.</p>



<p><strong><em><a href="https://plowunited.net/general/judges-remove-trumps-ex-lawyer-from-prosecutor-role/866/">Read More : Judges Remove Trump’s Ex-Lawyer from Prosecutor Role</a></em></strong></p>



<p>In response, Microsoft released security patches and urged all on-premises SharePoint server users to apply them immediately. The company expressed “high confidence” that the threat actors will continue targeting unpatched systems. Investigations are ongoing to determine if other actors are using the same exploits. The UK&#8217;s National Cyber Security Centre confirmed that a limited number of UK-based customers were also impacted.</p>



<p>According to Microsoft, attackers sent crafted requests to vulnerable SharePoint servers, which allowed them to steal key cryptographic material. This access enabled long-term intrusion into targeted networks. Charles Carmakal, a cybersecurity expert, said the hackers acted opportunistically, exploiting the flaw broadly before the patch became available. The primary targets appeared to be governments and enterprises operating on vulnerable infrastructure.</p>



<h2 class="wp-block-heading">Attackers Focused on Espionage and Data Theft, Microsoft Says</h2>



<p>Microsoft outlined the suspected motivations and patterns behind the cyberattacks. It said Linen Typhoon has conducted operations for more than a decade, primarily targeting intellectual property from entities related to defense, human rights, and strategic planning. The group’s aim appears to be aligned with China’s state interests.</p>



<p>Violet Typhoon has reportedly focused on espionage activities. Its targets include former military and government officials, NGOs, think tanks, academic institutions, media outlets, financial organizations, and healthcare providers across the US, Europe, and East Asia. Microsoft described Storm-2603 as a China-based threat actor, though its links to the government remain less certain.</p>



<p>Despite China’s denial, Microsoft insists on the credibility of its findings. Liu Pengyu, spokesperson for the Chinese embassy in Washington, rejected the claims, calling them unsubstantiated. He reiterated China&#8217;s opposition to all forms of cybercrime.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong><em><a href="https://amynicole.co/general/google-updates-ios-chrome-with-account-separation-tools/835/">Read More : Google Updates iOS Chrome With Account Separation Tools</a></em></strong></p>
</blockquote>



<p>Experts stress the significance of this breach. The actors exploited a weakness in SharePoint’s cryptographic processes, gaining persistent access to confidential information. Microsoft has committed to updating the public through its blog as investigations continue.</p>



<p>The company advised customers to monitor system logs and reinforce cybersecurity protocols. With geopolitical tensions already high, these revelations add further strain to relations between Western governments and Beijing. For organizations still using on-premises SharePoint servers, updating systems remains the most immediate safeguard against further intrusion.</p>
<p>The post <a href="https://amynicole.co/general/microsoft-says-chinese-hackers-breached-its-servers/838/">Microsoft Says Chinese Hackers Breached Its Servers</a> appeared first on <a href="https://amynicole.co">Amynicole</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
