In a troubling incident highlighting the vulnerability of government infrastructure to cyber threats, the National Nuclear Security Administration (NNSA)—the U.S. agency tasked with overseeing the nation’s nuclear weapons stockpile—has reportedly suffered a breach due to a significant flaw in Microsoft’s SharePoint document management software.
A recent report from Bloomberg News reveals that this breach is part of a broader series of cyberattacks exploiting a zero-day vulnerability in on-premise versions of Microsoft SharePoint, impacting over 50 organizations globally.
Understanding the NNSA
The National Nuclear Security Administration (NNSA) operates as a semi-autonomous entity within the U.S. Department of Energy. Its mission is to ensure national security through the military application of nuclear science. The NNSA is responsible for managing the U.S. nuclear arsenal, preventing nuclear proliferation, powering naval vessels with nuclear reactors, and responding to nuclear or radiological emergencies.
Chinese Hackers: The Force Behind the Attack
Microsoft has attributed this cyberattack to Chinese state-sponsored hacking groups, including those known as Linen Typhoon, Violet Typhoon, and Storm-2603. These hackers have reportedly exploited the zero-day vulnerability to gain remote access to sensitive systems, steal login credentials, and potentially spread to other connected networks.
According to Google’s Threat Intelligence Group, this vulnerability presents an enticing opportunity for ransomware operators, as it allows for “persistent, unauthenticated access that can bypass future patching.”
While it has been confirmed that the NNSA was among the victims, the agency stated that there is currently no evidence suggesting that sensitive or classified information was compromised during the breach.
“On Friday, July 18th, the exploitation of the Microsoft SharePoint zero-day vulnerability commenced affecting the Department of Energy, including the NNSA,” stated Ben Dietderich, Secretary of the Department of Energy, in an interview with BleepingComputer. He assured that the Department was minimally impacted due to its extensive use of Microsoft M365 cloud services and robust cybersecurity measures. Dietderich added that only “a very small number of systems were affected,” and all impacted systems are currently undergoing restoration.
Wider Impact of the Breach
The ramifications of this breach extend beyond the NNSA. Microsoft and cybersecurity experts have reported that other U.S. governmental entities, including the Department of Education, the Florida Department of Revenue, and the Rhode Island General Assembly, were also targeted. Additionally, international governments across Europe, the Middle East, and Africa experienced similar attacks.
Microsoft Takes Action
In response to this significant breach, Microsoft has released a crucial security update addressing the SharePoint Subscription Edition vulnerability and is collaborating with affected clients to investigate and secure impacted on-premises servers. The company has strongly urged all affected organizations to implement this update immediately. Furthermore, they emphasized that organizations utilizing the cloud-based SharePoint Online service were not vulnerable to this particular attack.