Chinese Hackers Infiltrate SharePoint

Microsoft Confirms Chinese Cyber Espionage Assault on SharePoint: Proof We’re Already in a Digital Cold War

EDITOR'S NOTES

As usual, the so-called “experts” are a day late and a firewall short. The same mainstream outlets that dismissed warnings of Chinese cyber warfare as “paranoid” are now sheepishly reporting what many of us have known for years: the digital frontier is wide open, and America’s critical infrastructure is under constant siege. If you’re still trusting cloud servers and government-backed tech giants to keep your data safe, you’re playing Russian roulette with your finances, your privacy, and your freedom.

Three Chinese Threat Actors Named in SharePoint Breach

While most Americans were distracted by stock market noise and election drama, Microsoft quietly dropped a digital bombshell: three Chinese state-sponsored hacking groups—Linen Typhoon, Violet Typhoon, and Storm-2603—have been exploiting serious vulnerabilities in SharePoint, the document-sharing platform used by businesses, universities, hospitals, and government agencies across the West.

According to Microsoft’s own Security Response Center, these cyber mercenaries have been targeting on-premises SharePoint servers through spoofing and remote code execution—techie jargon for “we walked through the front door while you were fumbling with your keys.” The disclosure, first made public in a July 19 blog post and updated just this week, confirms what many in the cybersecurity community have warned: China isn’t probing the fence. It’s already inside the compound.

Linen Typhoon: Stealing State Secrets Since 2012

Linen Typhoon, one of the three named actors, has been active since 2012 and is infamous for stealing intellectual property tied to defense, government planning, and even human rights groups. Their methods are subtle—"drive-by compromises," as Microsoft calls them—exploiting already-known weaknesses that lazy IT departments failed to patch.

Violet Typhoon: Targeting the Institutions That Shape Society

Then there’s Violet Typhoon, a more sophisticated and targeted espionage unit. Since 2015, this group has infiltrated the systems of ex-military personnel, NGOs, universities, media outlets, and even healthcare and financial institutions in the U.S., Europe, and East Asia. In other words: they're not just after secrets—they’re after infrastructure, trust, and the very fabric of Western society.

Microsoft says the group scans exposed web infrastructure for weaknesses and deploys web shells to maintain persistent access, effectively creating digital back doors into entire networks.

Storm-2603: The Unknown Variable in China’s Cyber Arsenal

Storm-2603, while less known, was also flagged in the latest wave of attacks. Microsoft has “medium confidence” it’s a Chinese outfit and admits it’s still unclear what their endgame is. Given China’s track record, the objective is likely multifaceted: digital surveillance, corporate theft, and political manipulation—all wrapped in plausible deniability.

Microsoft noted that Storm-2603 has deployed ransomware in the past, but couldn’t confirm its current goals. What we do know is that this is just one of dozens—possibly hundreds—of covert actors engaged in long-game cyberwarfare against the West.

The Real Danger: Dependence on Vulnerable Infrastructure

And here’s the part no one in the tech press wants to dwell on: SharePoint is used everywhere. If your employer handles sensitive data—financials, medical records, legal documents—and you’re still plugged into the cloud, your exposure is not just theoretical. It’s current and active.

Yes, Microsoft says they’ve “released security updates.” That’s about as reassuring as the Fed saying inflation is “transitory.” Anyone paying attention knows patchwork fixes are reactive, not proactive. The cyber landscape is deteriorating by the day, and China’s not the only one taking advantage. They're just the most organized.

We’re Not Preparing for War—We’re Already in It

This is exactly the kind of slow-burning digital war that creeps up on a civilization. It doesn’t make headlines until it’s too late. And by then, your bank accounts, retirement savings, and personal records are already compromised.

It’s not just about cybersecurity—it’s about sovereignty. If you’re trusting Big Tech to be your line of defense, you’ve already lost the first battle.

Take Back Control Before the Next Breach

Now’s the time to get ahead of this digital decay.
Download Bill Brocius’ free guide, “7 Steps to Protect Yourself from Bank Failure”, and learn how to unplug your financial life from the collapsing systems the elites are scrambling to patch. You’ll also get access to the tools and strategies to shield your assets from the surveillance state and the next wave of cyberattacks.

Click here to download the guide now

Better yet, join the Inner Circle for just $19.95/month and get direct insights from the man I trust most—Bill Brocius. His book, End of Banking As You Know It, is required reading for anyone who intends to survive the coming storm with their liberty—and liquidity—intact.