Microsoft knew of SharePoint security flaw but failed to effectively patch it, timeline shows
LONDON, July 22 (Reuters) – A security patch released by Microsoft (MSFT.O), opens new tab earlier this month failed to fully fix a critical flaw in the U.S. tech company’s SharePoint server software that had been identified at a hacking competition in May, opening the door to a sweeping global cyber espionage operation, according to a timeline of events reviewed by Reuters.A Microsoft spokesperson confirmed on Tuesday that its initial solution did not work. The spokesperson added that Microsoft had released further patches that fixed the issue.
Microsoft and Alphabet’s (GOOGL.O), opens new tab Google have said that China-linked hackers were likely behind the first wave of hacks.
The vulnerability that facilitated the attack was first identified in May at a hacking competition, opens new tab in Berlin organised by cybersecurity firm Trend Micro (4704.T), opens new tab, which offered cash bounties for the discovery of computer bugs in popular software.
A researcher, opens new tab working for the cybersecurity arm of Viettel, a telecommunications firm operated by Vietnam’s military, identified, opens new tab a SharePoint bug at the event, dubbed it “ToolShell” and demonstrated a method of exploiting it.
Reporting by James Pearson; Additional reporting by Raphael Satter and AJ Vicens; Editing by Joe Bavier and Rod Nickel
Microsoft knew of SharePoint security flaw but failed to effectively patch it, timeline shows


