Cyberattacks by foreign based hackers: What businesses and governments must do now
by K Dorai Raja, Managing Editor, ET
27 July

In a stark reminder of the escalating cyber threat landscape, multiple sophisticated cyberattacks attributed to state-sponsored actors have emerged over the past three weeks, targeting a diverse array of government agencies, critical infrastructure, and high-tech industries across the globe.
In the United States, Microsoft disclosed that several of its on-premises SharePoint servers had been compromised by groups identified as Storm-2603, Linen Typhoon, and Violet Typhoon – cyber units allegedly with ties to China’s Ministry of State Security. These actors exploited two previously unknown vulnerabilities – CVE-2025-49704 and CVE-2025-49706 – to infiltrate nearly 400 organisations worldwide. Among the most notable victims were the U.S. National Nuclear Security Administration (NNSA) and the National Institutes of Health (NIH), raising serious concerns about national security and the integrity of sensitive government systems.
What began as a campaign of digital espionage soon took a more financially motivated turn. Storm-2603, one of the groups responsible for the SharePoint exploitation, shifted tactics by deploying Warlock ransomware within breached systems. This hybridisation of espionage and ransomware represents an alarming evolution in threat actor behaviour, blurring the lines between state-sponsored surveillance and profit-driven disruption.
Singapore’s Cyber Security Agency also confirmed that the country’s critical information infrastructure had come under attack. Though specifics remain classified, the intrusion has been linked to UNC3886, a known Chinese cyber-espionage group. The breach highlights growing digital vulnerabilities in Southeast Asia amid intensifying geopolitical tensions and increasing reliance on digital systems for national operations.
Meanwhile, in Taiwan, a trio of threat actors – codenamed UNK_FistBump, UNK_DropPitch, and UNK_SparkyCarp—launched coordinated cyber-espionage campaigns against the island’s prized semiconductor industry. Occurring between March and June but only recently disclosed, the attacks appear focused on exfiltrating intellectual property and disrupting chip manufacturing capabilities, a sector that sits at the heart of the global technology supply chain and the ongoing U.S.-China tech standoff.
Adding a legal dimension to the cyber escalation, Italian authorities recently arrested Xu Zewei, a Chinese national believed to be associated with the Silk Typhoon hacking group. He faces multiple charges in the United States, including wire fraud and unauthorised access to protected computer systems, signaling that law enforcement efforts against foreign cybercriminals may be gaining ground - albeit slowly.
Best practices: fortifying your organisation against cyberthreats (advanced persistent threats)
1. Patch critical vulnerabilities immediately
Many recent breaches exploited known vulnerabilities in SharePoint and Microsoft platforms.
- Action: Apply security patches within 24–72 hours of release
- Tool: Implement a robust vulnerability management system with real-time monitoring
2. Adopt zero trust architecture
Trust nothing by default – even inside your network.
- Action: Enforce multi-factor authentication (MFA), identity segmentation, and least privilege access
- Tool: Use tools like Azure AD Conditional Access or Okta to manage user access dynamically
3. Secure email and collaboration tools
Email remains the #1 vector for phishing, credential theft, and lateral movement.
- Action: Harden cloud-based and on-premise collaboration systems (e.g., SharePoint, Exchange)
- Tool: Deploy AI-driven email security gateways, sandbox attachments, and scan links in real time
4. Conduct regular threat hunting
Proactive detection is essential – don’t wait for a breach to be discovered externally.
- Action: Assign internal red teams or contract with Managed Detection & Response (MDR) providers
- Tool: Use endpoint detection platforms (EDR/XDR) like CrowdStrike, SentinelOne, or Microsoft Defender
5. Encrypt and back up data regularly
Ransomware continues to evolve – offline backups are your last line of defense.
- Action: Implement 3-2-1 backup strategy (3 copies, 2 types of media, 1 offline)
- Tool: Leverage immutable storage and encryption at rest and in transit
6. Strengthen supply chain security
Nation-state hackers often exploit third-party vendors to access larger targets.
- Action: Audit your suppliers’ cybersecurity posture; include security clauses in contracts
- Tool: Continuous vendor risk assessment tools (e.g., SecurityScorecard, BitSight)
7. Train and simulate
Human error is often the weakest link.
- Action: Conduct quarterly phishing simulations, tabletop exercises, and security awareness training
- Tool: Platforms like KnowBe4, Cofense, or internal LMS modules





