Microsoft Slam-Dunks Exploit Code Sharing with China After SharePoint Fumble
Microsoft ditches sharing proof-of-concept exploit code with Chinese firms after SharePoint zero-day leaks. Instead, they’re sending only written bug descriptions, hoping to stop leaks while keeping defenders in the loop. Microsoft’s move comes after China-based groups turned SharePoint servers into playgrounds for hackers.

Hot Take:
When Microsoft’s SharePoint became the “Share”Point of a little too much information, they decided to cut the cord with China on proof-of-concept code sharing. It’s like realizing you’ve been giving the school bully your lunch money, only to see him buying stink bombs with it. A classic case of, “Fool me once, shame on you; fool me twice, you’re not getting any more POC codes!”
Key Points:
– Microsoft halts sharing proof-of-concept exploit code with Chinese firms after SharePoint zero-day leaks.
– The decision follows a mass exploitation of SharePoint vulnerabilities linked to early bug disclosure leaks.
– Chinese nation-state actors and ransomware gangs exploited these flaws before the final patch was issued.
– Microsoft now provides general written descriptions instead of POC code to firms in countries requiring government vulnerability reporting.
– Linen Typhoon, Violet Typhoon, and Storm-2603 are the main Chinese threat actors identified in exploiting these vulnerabilities.