back to article Blame a leak for Microsoft SharePoint attacks, researcher insists

A week after Microsoft told the world that its July software updates didn't fully fix a couple of bugs, which allowed miscreants to take over on-premises SharePoint servers and remotely execute code, researchers have assembled much of the puzzle — with one big missing piece. How did the attackers, who include Chinese …

  1. Doctor Syntax Silver badge

    Just thinking about the timing. If they suspect a leak two weeks before public release on the 8th why did the attacks only start on the 7th? Did it take that long for the leak to work through?

    I'm not familiar with the way these things are due but are the PT releases simultaneous world-wide ot locally timed because there a places in the world where it's July 8th while at other places it's still july 7th?

    1. anonymous cat herder

      My guess is as soon as the exploit was leaked, the clock started ticking and they knew they had 2 weeks to successfuly weaponise, deploy and launch attacks containing the exploit. They only just made it in time; I probably would have missed the deadline.

      1. Doctor Syntax Silver badge

        It depends on how obvious the weaponisation was. Some of the exploits seem to happen PDQ.

  2. AnonymousCward

    Responsible disclosure done wrong… every time

    Rather than hiding things, a lot of the real world damage could have been prevented had Microsoft disclosed to everyone (from the outset of finding out about the problem) that they urgently needed to hide their private corporate SharePoint instances behind some proper additional Kerberos authentication at the web server level or use a decent reverse proxy, VPN, IPSec or another mitigation designed to prevent untrusted entities from interacting with it in the first place, until a fix could be issued. Instead they left it a bit late, only sounding the alarm long after they’d ensured their overpriced cloud instances were safe, and did a piss poor job with messaging until their initial attempt at a patch was botched.

    This isn’t the only time they’ve dropped the ball either, just on file sharing solutions alone. For instance, Microsoft never made SMB truly Internet safe, and for years dithered on the messaging about SMB security and how appropriate it is to use outside of a tightly controlled environment. If a protocol isn’t Internet safe, it isn’t really network safe in general, but Microsoft never wanted to make that clear until they had a [paid] solution ready. Many, many systems were compromised as a result of SMB exploits in the early days, to the point where ISPs had to block Port 445 on behalf of their subscribers. But even more recently we saw major compromises on internal networks (the UK NHS ransomware attacks being a big example of this). Microsoft eventually fixed the SMB Internet safety problem by implementing a glorified SSL proxy over the top (SMB-over-QUIC) but only made it available on their cloud at first (specifically in Server 2022 Azure Edition) before finally making people buy a whole new OS (Server 2025) if they wanted to have the same security on-prem.

    I say this as someone who earns a living maintaining Microsoft products: You will keep having this same issue over and over again, and you will keep paying people like me to maintain these terrible products, even when there are far better options out there.

    1. Anonymous Coward
      Anonymous Coward

      Re: Responsible disclosure done wrong… every time

      Hear hear. It's a Microsoft product, of course you have to put it behind some real protection. That's been true for decades.

  3. kmorwath Silver badge

    Nice Sharepoint you have on premises....

    .... it would be bad if something happened to it. Look at my Azure offer... it is not vulnerable...

    If I were Congress - I would grill Nadella immediately. But probably he paid Trump enough to avoid it.

  4. elsergiovolador Silver badge

    Leaky leak

    The cybersecurity world acts baffled every time a patch leaks before release, as if we don’t live in an economy built on disposable labour and institutional distrust. The truth is simpler and more uncomfortable: when corporations hollow themselves out in pursuit of margin, they also hollow out their defences.

    It’s not just Microsoft. It’s the entire model. Lay off half your security team to boost your share price, outsource critical work to the lowest bidder, funnel resources into C-suite bonuses and stock buybacks, and then wring your hands when someone in the system decides loyalty isn’t worth a cold lunch and a hot desk.

    Employees are told to return to soulless offices while senior management dials in from the Maldives. The car park has luxury SUVs, while junior staff are choosing between topping up their heating or making rent. Promotions are frozen. Pay rises are laughable. And the cost of basic dignity - owning a home, starting a family - is pushed further out of reach each year.

    In this environment, leaks aren’t anomalies. They’re pressure valves. All it takes is one disillusioned insider with a conscience dulled by corporate hypocrisy and an envelope waved by someone promising to make their life a little less grim. Not out of malice. Just weariness.

    If you build your entire operation on mistrust, underpayment, and performative ethics, you shouldn’t be surprised when the real vulnerabilities aren’t in the code - they’re in the culture.

    1. Doctor Syntax Silver badge

      Re: Leaky leak

      You could go a step further. Why pay someone to leak a vulnerability? Why not pay someone to put it there?

      1. HMcG Bronze badge

        Re: Leaky leak

        Well, given that it has now been revealed that Microsoft had Sharepoint supported by a Chinese engineering team, it's possible that they were just told to put the vunrability, without even being paid,

  5. Anonymous Coward
    Anonymous Coward

    I wonder...

    If I wanted info on the latest (known) vulnerabilities, and know when they'd be patched, I'd either try to be a MAPP vendor, buy the info off a MAPP vendor, or quietly compromise a MAPP vendor's systems so I could steal the info. If the third option, it would be in my best interest to not do anything that let the vendor know I was in their systems.

    Think somebody's pulled one of those?

  6. r00t2

    What a joke.

    Leaks do not, have never, and will never cause a vulnerability in software (or hardware/firmware). Design/implementation flaws do. What's the adage - "Security by obscurity isn't"? Saying a leak causes vulnerability is precisely that - security by obscurity.

    Let this be a lesson to all corporate compliance officers and other security "professionals" - POLICY DOES NOT PROTECT, CONTROLS DO. All policy does is establish context of consequences *after an incident*, stop acting pikachu-surprised-face when the policy doesn't *prevent* an incident.

    1. HMcG Bronze badge

      Re: What a joke.

      Leaks might not cause vunerabilities, but having your critical defense infrastucture supported by an engineering team based in China might well do. If the Chinese government tells a China-based Micorsoft engineer to do something 'or else', they are going to do it regadless of any company loyalty.

  7. JohnnyS777

    Yeah, right.

    Sure, it's all the fault of the LEAKER. The PR people at Microsoft have no shame.

    Microsoft, your code is poo. Your software is poo. It's all poo, all the way down.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like