In May 2025, under the fluorescent lights of a Berlin conference hall, the world’s top ethical hackers gathered for Pwn2Own, an annual competition that often forecasts tomorrow’s cyber threats. Among them, a researcher from Viettel made headlines by breaching Microsoft's on-premises SharePoint server, a legacy system still widely used by businesses for internal file sharing.
The researcher walked away with a $100,000 prize, and in doing so, exposed a serious vulnerability that would soon spiral far beyond the walls of the conference.
Dubbed ToolShell, the exploit chained multiple flaws together, enabling attackers to execute remote code on unpatched SharePoint servers, no login required. In layman’s terms, it was like slipping a virus onto an office computer without even opening the front door.
Then came July.
The exploit leaked into the wild before Microsoft could fully deploy a comprehensive fix. On July 7, one day before Microsoft’s routine "Patch Tuesday", attackers began launching automated strikes across the globe. Microsoft’s initial patches acted more like duct tape than a solution: surface-level, temporary, and critically incomplete.
By July 17, cybersecurity firm Eye Security observed widespread scanning and exploitation of vulnerable servers. Over 9,000 systems were exposed, with targets ranging from hospitals and universities to financial institutions and government bodies. Many of the attacks were attributed to state-sponsored hacking groups out of China, who used the vulnerability to lay groundwork for future ransomware attacks and data theft.
Among the impacted were at least seven U.S. federal agencies, including the Department of Homeland Security, Department of Energy, and Department of Education. While DHS reported no major data exfiltration at the time, the nature of the breach left many systems potentially compromised. Persistent access, where an attacker silently maintains entry long after the initial exploit, remains a key concern.
Not all headlines were bleak.
Department of Defense CIO Katie Arrington confirmed that the Pentagon had not been compromised. She credited their quick response, daily coordination with Microsoft, and aggressive forensic investigation. It's a rare cybersecurity success story that underscores the importance of proactive defense, even when dealing with aging systems.
By July 19, Microsoft finally released a stronger advisory, complete with deeper patches and instructions to rotate any compromised keys. But for many, the damage was already done.
Microsoft has been nudging enterprises toward its cloud-based SharePoint for years, leaving the on-premises version in a sort of digital purgatory still supported, but increasingly neglected. These legacy systems, often overlooked and under-patched, have become playgrounds for attackers. For threat actors, these environments are “digital backwaters” ripe for exploitation.
And it’s not just government IT teams on the line, any organization using shared file infrastructure should see this as a blueprint for what can go wrong.
1. Rotate Your Keys; Yesterday
If you haven’t already swapped out any potentially compromised keys, you’re playing with fire. Do it now.
2. Patch Like Your Data Depends On It (Because It Does)
Don’t rely on default schedules or manual updates. Test patches, apply them promptly, and consider managed services that automate this process.
3. Monitor Like the Pentagon
The best defense is early detection. Round-the-clock threat monitoring, like our Security Operations Center (SOC) services, can spot and contain threats before they escalate.
The SharePoint breach is more than another entry in the long list of cybersecurity incidents, it’s a case study in how legacy infrastructure, poor patching discipline, and slow responses create the perfect storm for attackers. The Pentagon’s escape wasn’t luck, it was strategy, vigilance, and speed.
Organizations everywhere need to take note: aging systems require modern defenses. Proactivity isn’t optional anymore, it’s survival. Microsoft may have left the gun loaded, but it's up to each of us to make sure we're not in the line of fire.
Hire us to set your IT strategy up for sustainable success.
Learn about our proven No-Nonsense approach.
Get an IT roadmap designed specifically for you.
Fearlessly grow your business.