Microsoft knew of SharePoint security flaw but failed to effectively patch it, timeline shows

A Microsoft spokesperson confirmed on Tuesday that its initial solution did not work. The spokesperson added that Microsoft had released further patches that fixed the issue.
It remains unclear who is behind the ongoing operation, which targeted around 100 organisations over the weekend and is expected to escalate as other hackers join the fray. Microsoft said in a blog post that two allegedly Chinese hacking groups, dubbed “Linen Typhoon” and “Violet Typhoon,” were exploiting the vulnerabilities, along with another China-based hacking group.
Microsoft and Alphabet’s (GOOGL.O), opens new tab Google have said that China-linked hackers were likely behind the first wave of hacks.
The vulnerability that facilitated the attack was first identified in May at a hacking competition, opens new tab in Berlin organised by cybersecurity firm Trend Micro (4704.T), opens new tab, which offered cash bounties for the discovery of computer bugs in popular software.
A researcher, opens new tab working for the cybersecurity arm of Viettel, a telecommunications firm operated by Vietnam’s military, identified, opens new tab a SharePoint bug at the event, dubbed it “ToolShell” and demonstrated a method of exploiting it.
Microsoft said in a July 8 security update that it had identified, opens new tab the bug, listed it as a critical vulnerability, and released patches to fix it.
Reporting by James Pearson; Additional reporting by Raphael Satter and AJ Vicens; Editing by Joe Bavier and Rod Nickel
Microsoft knew of SharePoint security flaw but failed to effectively patch it, timeline shows