Microsoft probes suspected leak from cybersecurity partner program

Source Cryptopolitan

Microsoft is probing whether a leak from its Microsoft Active Protections Program (MAPP)—an early warning system for cybersecurity partners—may have enabled Chinese hackers to exploit unpatched vulnerabilities in its SharePoint server software.

The tech firm’s latest patch failed to fully resolve a critical flaw, exposing the tech giant’s systems to a sophisticated global cyber espionage campaign.

In a blog post on Tuesday, Microsoft said the exploitation is being carried out by two Chinese state-affiliated groups, Linen Typhoon and Violet Typhoon, alongside a third group, also believed to be based in China.

Microsoft probes suspected leak from cybersecurity partner program

The company is now investigating whether details from its MAPP program—shared with partners ahead of public patch releases—may have been leaked, accelerating the spread of these attacks.

Microsoft confirmed that it “continually evaluates the efficacy and security of all of our partner programs and makes the necessary improvements as needed.”

The SharePoint vulnerability first came to light in May when Vietnamese security researcher Dinh Ho Anh Khoa demonstrated it at the Pwn2Own cybersecurity conference in Berlin, organized by Trend Micro’s Zero Day Initiative. Khoa was awarded $100,000, and Microsoft issued an initial patch in July.

However, Dustin Childs, head of threat awareness at Trend Micro, said that MAPP partners had been informed of the vulnerability across three waves—June 24, July 3, and July 7. Coincidentally, Microsoft noted the first exploit attempts began on July 7.

Childs suggested the most likely scenario is that “someone in the MAPP program used that information to create the exploits.” While he didn’t name any vendor, he noted the exploit attempts originated mostly from China, making it “reasonable to speculate” the leak came from a company in that region.

Chinese state-backed hackers exploit unpatched SharePoint vulnerability

This is not the first time Microsoft has dealt with this kind of MAPP-related leak. A decade ago, the firm jettisoned China-headquartered Hangzhou DPTech Technologies Co., Ltd., for violating its nondisclosure agreement. Microsoft admitted at the time that there were risks and understood that vulnerable data could be abused.

The MAPP program, which debuted in 2008, was intended to provide security vendors with advance notice of the technical details of vulnerabilities — and, on occasion, sample proof-of-concept code — so they could better protect their customers. A leaked breach now would fly directly in the face of the program’s mission—empowering defenders, not attackers.

Microsoft has not disclosed whether it has identified the source of the leak, but emphasized that any NDA breach would be taken seriously.

Past breaches resurface as Microsoft reconsiders MAPP program integrity

In 2021, Microsoft suspected at least two other Chinese MAPP partners of leaking information about vulnerabilities in its Exchange servers. This led to a global hacking campaign that Microsoft attributed to a Chinese espionage group called Hafnium. It was one of the firm’s worst breaches ever—tens of thousands of exchange servers were hacked, including at the European Banking Authority and the Norwegian Parliament.

After the 2021 incident, the company considered revising the MAPP program. But it did not disclose whether any changes were ultimately made, or whether any leaks were discovered.

Under a 2021 Chinese law, companies and security researchers must report newly discovered vulnerabilities to the Ministry of Industry and Information Technology within 48 hours, according to a report by the Atlantic Council. Some Chinese firms still involved in MAPP, such as Beijing CyberKunlun Technology Co Ltd., also participate in the China National Vulnerability Database—run by the Ministry of State Security—raising further concerns about dual reporting obligations.

Eugenio Benincasa, a researcher at ETH Zurich’s Center for Security Studies, points to the lack of transparency in how Chinese companies reconcile Microsoft’s confidentiality rules with state reporting mandates. “We know some of these firms work with security agencies, and China’s vulnerability management is highly centralized,” he said. “This is an area that clearly needs more scrutiny.”

Your crypto news deserves attention - KEY Difference Wire puts you on 250+ top sites

Disclaimer: For information purposes only. Past performance is not indicative of future results.
placeholder
Silver Price Forecasts: XAG/USD approaches $78.00 boosted by Iran peace hopesSilver (XAG/USD) is rushing higher on Tuesday, reaching fresh two-week highs right below $78.00 at the time of writing, after bouncing from lows around $72.60 on Monday.
Author  TradingKey
11 hours ago
Silver (XAG/USD) is rushing higher on Tuesday, reaching fresh two-week highs right below $78.00 at the time of writing, after bouncing from lows around $72.60 on Monday.
placeholder
Trump Blockade of Strait of Hormuz Drives Oil Price Surge, Will This Be Another TACO? On Sunday (April 13), Trump announced following the breakdown of U.S.-Iran negotiations that the U.S. Navy would impose a maritime blockade on Iranian ports starting Monday.Following the
Author  TradingKey
Yesterday 10: 27
On Sunday (April 13), Trump announced following the breakdown of U.S.-Iran negotiations that the U.S. Navy would impose a maritime blockade on Iranian ports starting Monday.Following the
placeholder
U.S.-Iran Standoff in the Strait of Hormuz. Iranian-Controlled Strait Has Not Resumed Passage; Why Does Trump Still Want a Military Blockade?Following the failure of U.S.-Iran peace talks, President Trump announced on Sunday that the U.S. Navy will immediately blockade the Strait of Hormuz and prevent any vessels that have pai
Author  TradingKey
Yesterday 03: 20
Following the failure of U.S.-Iran peace talks, President Trump announced on Sunday that the U.S. Navy will immediately blockade the Strait of Hormuz and prevent any vessels that have pai
placeholder
WTI jumps roughly 8% toward $100 as US blockades Strait of HormuzWest Texas Intermediate (WTI) – the US oil benchmark – has opened the week with a bullish gap, climbing roughly 8%, looking to retarget the $100 threshold.
Author  Mitrade
Yesterday 01: 37
West Texas Intermediate (WTI) – the US oil benchmark – has opened the week with a bullish gap, climbing roughly 8%, looking to retarget the $100 threshold.
placeholder
When Will Gold Rise Under the Pressure of High Oil Prices? On April 8, spot gold ( XAUUSD) at one point surged past $4,800 per ounce, hitting a peak of $4,857; however, it fell back to $4,698 on April 9, wiping out all gains in just 48 hours. Thi
Author  TradingKey
Apr 10, Fri
On April 8, spot gold ( XAUUSD) at one point surged past $4,800 per ounce, hitting a peak of $4,857; however, it fell back to $4,698 on April 9, wiping out all gains in just 48 hours. Thi
goTop
quote