US Nuclear Weapons Agency Breached: Hackers Exploit Microsoft SharePoint

Published:

spot_img

Cybersecurity Incident Impacting the NNSA: An Overview

Introduction to the Breach

The National Nuclear Security Administration (NNSA), a semi-autonomous agency under the U.S. Department of Energy, has confirmed its involvement in a significant cybersecurity breach that also affected at least 100 other organizations. Tasked with overseeing the U.S. nuclear weapons stockpile and responding to nuclear emergencies, the NNSA found its network compromised due to a vulnerability in Microsoft SharePoint.

Details of the Exploitation

On July 18, 2023, the NNSA’s network became susceptible when hackers leveraged a critical zero-day vulnerability in Microsoft SharePoint. Ben Dietderich, the Press Secretary for the Department of Energy, provided insights regarding the incident during a discussion with BleepingComputer. “The exploitation affected the Department of Energy, including the NNSA,” Dietderich noted, emphasizing the seriousness of the breach.

Despite the situation, Dietderich reassured that the impact was minimal due to the department’s extensive usage of Microsoft M365 cloud services and robust cybersecurity frameworks. Only a limited number of systems were compromised, all of which are currently undergoing restoration.

Securing Sensitive Data

According to sources within the agency, there is no indication that classified or sensitive data was extracted during the breach. This point was corroborated by a report from Bloomberg, alleviating some concerns over national security implications stemming from the incident.

Ongoing Vulnerabilities and Threat Actors

As investigations continue, it has been revealed that two vulnerabilities are currently being exploited, attracting significant attention from global security agencies. The culprits are suspected to be Chinese state-sponsored hackers. Microsoft initially reported on CVE-2025-53770, a remote code execution bug related to an earlier disclosed vulnerability, CVE-2025-49706. However, shortly after, Microsoft identified a second active SharePoint vulnerability, CVE-2025-53771.

In a blog post dated July 22, Microsoft stated, “Two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon, are exploiting these vulnerabilities targeting internet-facing SharePoint servers.” Additionally, a third actor, referred to as Storm-2603, has also been linked to these exploits.

Methods Employed by Threat Actors

The attackers have been deploying web shells to retrieve critical MachineKey data, allowing for full access to SharePoint content and executing code remotely. Microsoft has warned that exploitation of unpatched on-premises SharePoint systems is likely to persist.

Linen Typhoon’s operations have been active since at least 2012, primarily focusing on the acquisition of intellectual property tied to government and defense sectors, with particular attention to human rights and strategic planning issues. In contrast, Violet Typhoon has been conducting espionage activities since 2015, targeting former military and government personnel, non-governmental organizations (NGOs), academia, media, and the healthcare sector.

The actor identified as Storm-2603 is suspected to have ties to the People’s Republic of China, although investigations are still ongoing to clarify their exact affiliations and objectives.

Conclusion

This cybersecurity incident highlights the vulnerabilities present in critical infrastructure sectors and emphasizes the importance of robust cybersecurity measures. As organizations continue to assess their defenses in light of this breach, the need for proactive risk management and awareness of evolving threats has never been more crucial.

While the immediate ramifications for the NNSA may be contained, the incident serves as a stark reminder of the ongoing challenges posed by sophisticated cyber threats in today’s digital landscape.

spot_img

Related articles

Recent articles

Hive0163 Ransomware Operators Deploy AI-Generated Slopoly Malware in Sophisticated Attack

Hive0163 Ransomware Operators Deploy AI-Generated Slopoly Malware in Sophisticated Attack Researchers have identified a case of suspected AI-generated malware, known as "Slopoly," utilized in a...

Fighting AI-Driven Cyberattacks with Preemptive Cyber Deception Strategies

Fighting AI-Driven Cyberattacks with Preemptive Cyber Deception Strategies Recent developments in artificial intelligence (AI) have underscored its role in facilitating advanced cyber espionage campaigns, as...

Afreximbank Launches Season II of ‘Impact Stories,’ Highlighting Transformative Projects Across Africa and the Caribbean

Afreximbank Launches Season II of ‘Impact Stories,’ Highlighting Transformative Projects Across Africa and the Caribbean The African Export-Import Bank (Afreximbank) has announced the launch of...

Cohesity Advances Cyber Resilience with Enhanced Data Protection and AI Security Solutions

Cohesity Advances Cyber Resilience with Enhanced Data Protection and AI Security Solutions Cohesity has unveiled significant enhancements to its data protection and security portfolio, aimed...