July rundown: Salt Typhoon and SharePoint scares

US public sector organizations are under serious threat from the state-backed hacking group

The text "Salt Typhoon and SharePoint scares" against an abstract background of a crystalline blue abstract image. The words "Salt Typhoon" and "SharePoint" are in yellow, the rest are in white. In the bottom-right corner, the ITPro podcast is shown.
(Image credit: Future)

As the old saying goes, it never rains but it pours. And, seeing how we’re based in the UK, it would be fitting that the month this most accurately described in 2025 so far has been July.

In the past four weeks, two almighty security stories have broken, with far-reaching implications for the tech sector and beyond. First, we learned that the China-backed hacking group Salt Typhoon had critically breached the US National Guard for more than a year – and has potentially gone undetected in other US military networks.

Later in the month, Microsoft revealed a major vulnerability in on-premises Sharepoint servers, sounding the alarm for users to patch with urgency – but the days after have seen attack after successful attack carried out.

In this episode Jane welcomes back Ross Kelly, ITPro’s news and analysis editor, to explore what happened to make July such a bad month for cybersecurity.

Highlights

"The figures from the DoD report are quite concerning the exfiltrated network configuration files to "enable cyber intrusion elsewhere". And between January 2023 and March 2024, [they] stole 1400 plus configuration files – those are associated with 70 US government critical infrastructure, identities, 12 sectors. You know, that's devastating."

"We keep seeing incidents like this and there was a similar incident by a similarly named group, Volt Typhoon, which managed to stay under the radar in the US electric grid for around a year. So this is precisely what these state affiliated, I guess you could say, groups intend to do. They like to dig their claws into something and see how it, to put it very casually, see how it goes. "

"I think it's safe to say Microsoft said 'patch now, please, please patch'. It's worth noting as well that Microsoft admitted that it saw hackers trying to exploit this flaw as early as 7 July."

Footnotes

Subscribe 

Rory Bathgate
Features and Multimedia Editor

Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.

In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.