{"id":33041,"date":"2020-01-29T22:39:28","date_gmt":"2020-01-29T22:39:28","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/"},"modified":"2020-01-29T22:39:28","modified_gmt":"2020-01-29T22:39:28","slug":"un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/","title":{"rendered":"UN didn&#8217;t patch SharePoint, got mega-hacked, covered it up, kept most staff in the dark, finally forced to admit it"},"content":{"rendered":"<p>The United Nations\u2019 European headquarters in Geneva and Vienna were hacked last summer, putting thousands of staff records at miscreants&#8217; fingertips. Incredibly, the organization decided to cover it up without informing those affected nor the public.<\/p>\n<p>That is the <a target=\"_blank\" href=\"https:\/\/www.thenewhumanitarian.org\/investigation\/2020\/01\/29\/united-nations-cyber-attack\" rel=\"noopener noreferrer\">extraordinary claim<\/a> of The New Humanitarian, which until a few years ago was an official UN publication covering humanitarian crises. Today, it said the UN has confirmed both the hack and the decision not to divulge any details.<\/p>\n<p>Dozens of UN servers were impacted in an attack that began in mid-July 2019 but was only noticed one month later, according to a confidential report dated September 20. The publication gained access to that report, which outlines a series of security holes discovered by an external forensic company as well as internal efforts to contain the hack.<\/p>\n<p>\u201cWe are working under the assumption that the entire domain is compromised,\u201d an alert sent to internal sysadmins on August 30 noted. \u201cThe attacker doesn&#8217;t show signs of activity so far, we assume they established their position and are dormant.\u201d<\/p>\n<p>A senior IT official dubbed the attack a \u201cmajor meltdown,\u201d in which personnel records &#8211; as well as contract data covering thousands of individuals and organizations &#8211; was accessed. The hackers were able to get into user-management systems and past firewalls; eventually compromising over 40 servers, with the vast majority at the European headquarters in Geneva.<\/p>\n<p>But despite the size and extent of the hack, the UN decided to keep it secret. Only IT teams and the heads of the stations in question were informed.<\/p>\n<p>\u201cThe attack resulted in a compromise of core infrastructure components,\u201d a UN spokesperson told The New Humanitarian. \u201cAs the exact nature and scope of the incident could not be determined, [the UN] decided not to publicly disclose the breach.\u201d<\/p>\n<h3 class=\"crosshead\"><span>Just a quick password change, nothing to worry about<\/span><\/h3>\n<p>Employees whose data was within reach of the hackers were told only that they needed to change their password and were not informed that their personal details had been compromised. That decision not to disclose any details stems from a \u201ccover-up culture\u201d the anonymous IT official who leaked the internal report told the publication.<\/p>\n<p>The report notes it has been unable to calculate the extent of damage but one techie \u2013 it\u2019s not clear it is the same one that leaked the report \u2013 estimated that 400GB had been pulled from United Nations servers.<\/p>\n<p>Most worrying is the fact the UN Office of the High Commissioner for Human Rights (OHCHR) was one of those compromised. The OHCHR deals with highly sensitive information from people who put their lives at risk to uncover human rights abuses.<\/p>\n<p>Making matters worse, IT specialists had warned the UN for years that it was at risk from hacking. An audit in 2012 identified an \u201cunacceptable level of risk,\u201d and resulted in a restructure that consolidated servers, websites, and typical services like email, and then outsourced them to commercial providers at a cost of $1.7bn.<\/p>\n<p>But internal warnings about lax security continued, and an <a target=\"_blank\" href=\"https:\/\/undocs.org\/en\/A\/73\/160\" rel=\"noopener noreferrer\">official audit<\/a> in 2018 was full of red flags. \u201cThe performance management framework had not been implemented,\u201d it stated, adding that there were \u201cpolicy gaps in areas of emerging concern, such as the outsourcing of ICT services, end-user device usage, information-sharing, open data and the reuse and safe disposal of decommissioned ICT equipment.\u201d<\/p>\n<p>There were lengthy delays in security projects, and, internally, departments were ignoring compliance efforts. The audit \u201cnoted with concern\u201d that 28 of the 37 internal groups hadn\u2019t responded at all and that over the nearly 1,500 websites and web apps identified only a single one had carried out a security assessment.<\/p>\n<p>The audit also found that less than half of the 38,105 staff had done a compulsory course in basic IT security that had been designed to help reduce overall security risks. In short, this was an accident waiting to happen, especially given the UN\u2019s high-profile status.<\/p>\n<h3 class=\"crosshead\"><span>SharePoint shafting<\/span><\/h3>\n<p>As to the miscreants&#8217; entry point, it was a <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/02\/13\/patch_tuesday_february\/\" rel=\"noopener noreferrer\">known flaw<\/a> in Microsoft SharePoint (CVE-2019-0604) for which a software patch had been available for months yet the UN had failed to apply it.<\/p>\n<p>The hole can be exploited by a remote attacker to bypass logins and issue system-level commands \u2013 in other words, a big problem from a security standpoint. The hackers broke into a vulnerable SharePoint deployment in Vienna and then, with admin access, moved within the organization&#8217;s networks to access the Geneva headquarters and then the OHCHR.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/01\/22\/shutterstock_mbs.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Saudi crown prince Mohammad bin Salman with Russian President Putin\"><\/p>\n<h2 title=\"Rapporteurs call for investigation, technical security report leaks\">Who honestly has a crown prince in their threat model? UN report officially fingers Saudi royal as Bezos hacker<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2020\/01\/22\/saudi_bezos_phone_hack\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>One person who was shown the report \u2013 cybersecurity researcher <a target=\"_blank\" href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1222522757344301056\" rel=\"noopener noreferrer\">Kevin Beaumont<\/a> \u2013 said that the intrusion \u201chas the hallmarks of a sophisticated threat actor.\u201d<\/p>\n<p>With North Korea, China, Iran, and others, investing heavily in cyber-attack capabilities, as well as private criminal gangs, it could be anyone, and the report does not find any fingerprints that point to a specific group. That may be a result of the UN trying to keep the entire thing under wraps.<\/p>\n<p>It could also, of course, be the US, which would legally be allowed to target the UN in Geneva, rather than UN headquarters in New York because it is outside North America. The United States, like other countries, has a long history of trying to find out what is going on behind closed doors at the United Nations.<\/p>\n<p>Either way, it was a huge security cock-up on the UN\u2019s part and its decision not to disclose it to anyone, even those impacted, flies in the face of modern best practice. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1889\/-8120\/detecting-cyber-attacks-as-a-small-to-medium-business?td=wptl1889\">Detecting cyber attacks as a small to medium business<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/01\/29\/un_covered_up_hack\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For an organization accused of being &#8216;all talk, no action&#8217;, there&#8217;s not even enough talking \u2013 to its own employees The United Nations\u2019 European headquarters in Geneva and Vienna were hacked last summer, putting thousands of staff records at miscreants&#8217; fingertips. Incredibly, the organization decided to cover it up without informing those affected nor the public.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":33042,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-33041","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UN didn&#039;t patch SharePoint, got mega-hacked, covered it up, kept most staff in the dark, finally forced to admit it 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UN didn&#039;t patch SharePoint, got mega-hacked, covered it up, kept most staff in the dark, finally forced to admit it 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-29T22:39:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"UN didn&#8217;t patch SharePoint, got mega-hacked, covered it up, kept most staff in the dark, finally forced to admit it\",\"datePublished\":\"2020-01-29T22:39:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\\\/\"},\"wordCount\":961,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\\\/\",\"name\":\"UN didn't patch SharePoint, got mega-hacked, covered it up, kept most staff in the dark, finally forced to admit it 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it.jpg\",\"datePublished\":\"2020-01-29T22:39:28+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UN didn&#8217;t patch SharePoint, got mega-hacked, covered it up, kept most staff in the dark, finally forced to admit it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UN didn't patch SharePoint, got mega-hacked, covered it up, kept most staff in the dark, finally forced to admit it 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/","og_locale":"en_US","og_type":"article","og_title":"UN didn't patch SharePoint, got mega-hacked, covered it up, kept most staff in the dark, finally forced to admit it 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-29T22:39:28+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"UN didn&#8217;t patch SharePoint, got mega-hacked, covered it up, kept most staff in the dark, finally forced to admit it","datePublished":"2020-01-29T22:39:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/"},"wordCount":961,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/","url":"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/","name":"UN didn't patch SharePoint, got mega-hacked, covered it up, kept most staff in the dark, finally forced to admit it 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it.jpg","datePublished":"2020-01-29T22:39:28+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/un-didnt-patch-sharepoint-got-mega-hacked-covered-it-up-kept-most-staff-in-the-dark-finally-forced-to-admit-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"UN didn&#8217;t patch SharePoint, got mega-hacked, covered it up, kept most staff in the dark, finally forced to admit it"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=33041"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33041\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/33042"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=33041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=33041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=33041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}