21st July 2025 Cyber Update: Australian Migration Authority Data Breach and Critical SharePoint Zero-Day

Australian migration authority OMARA discloses accidental data breach affecting six registered agents. Meanwhile, Microsoft warns of critical SharePoint zero-day CVE-2025-53770 being actively exploited worldwide.

21st July 2025 Cyber Update: Australian Migration Authority Data Breach and Critical SharePoint Zero-Day
Photo by Oleksandr Chumak / Unsplash

Cyber News Centre's cyber update for 21st July 2025: The Australian Office of the Migration Agents Registration Authority has disclosed an accidental data breach affecting six registered migration agents. Meanwhile, Microsoft has confirmed active exploitation of a critical SharePoint zero-day vulnerability, impacting organizations worldwide.

1. Australian Migration Authority Discloses Accidental Data Breach

The Office of the Migration Agents Registration Authority (OMARA) is a regulatory body within Australia's Department of Home Affairs responsible for monitoring over 5,000 registered migration agents nationwide. The agency investigates complaints, provides professional development services, and protects consumers who rely on migration agent services across Australia's immigration system.

The Update and Why It Matters

Update: OMARA disclosed on July 14, 2025, that a data breach occurred on May 5 and 6, 2025, when the agency's website search function incorrectly revealed internal documents to users. The breach affected six registered migration agents whose details became accessible through the OMARA Portal search feature. When users searched for a registered migration agent's name, certain internal documents became viewable and downloadable, including agent full names, migration agent registration numbers, related business contacts, and internal commentary collected by OMARA.

​​The Office of the Migration Agents Registration Authority (OMARA) has been affected by a data breach concerning the OMARA Portal on the OMARA website,” an OMARA spokesperson said in a 14 July media release.

The portal was immediately shut down upon discovery, and departmental experts conducted an investigation confirming the breach was a small, isolated event not resulting from malicious or criminal attack. The matter has been reported to the Office of the Australian Information Commissioner under Privacy Act 1988 obligations, and all six affected individuals have been contacted and offered support.

Why it Matters: This incident highlights the vulnerability of government digital systems to configuration errors that can inadvertently expose sensitive regulatory information. While not a malicious attack, the breach demonstrates how technical oversights in search functionality can compromise personal and professional data of regulated individuals.

For Australia's migration sector, this incident underscores the importance of robust testing and security controls for government portals handling sensitive regulatory information. The two-month delay between discovery and public disclosure raises questions about notification timelines for government data breaches, particularly when they involve professional regulatory information that could impact individuals' livelihoods and reputations in the migration services industry.


2. Microsoft SharePoint Zero-Day Under Active Global Exploitation

Microsoft Corporation is a multinational technology company headquartered in Redmond, Washington, providing enterprise software solutions including SharePoint Server for document collaboration and content management. SharePoint Server is widely deployed across government agencies, corporations, and organizations globally for internal document sharing and workflow management.

The Update and Why It Matters

Update: Microsoft has confirmed active exploitation of a critical zero-day vulnerability in SharePoint Server, tracked as CVE-2025-53770 with a maximum CVSS severity score of 9.8. The vulnerability, dubbed "ToolShell" by security researchers, allows unauthenticated remote code execution through deserialization of untrusted data in on-premises SharePoint installations. Active exploitation began on July 18, 2025, with more than 75 company servers already compromised across 29 organizations, including multinational firms and government entities.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the vulnerability to its Known Exploited Vulnerabilities catalog and issued urgent guidance for federal agencies.

Today, Microsoft released security patches, along with mitigation guidance for immediate protection. The vulnerability affects only on-premises SharePoint Server installations, while SharePoint Online in Microsoft 365 remains unaffected.

Why it Matters: This zero-day represents one of the most critical enterprise security threats of 2025, with the potential to compromise sensitive corporate and government data across thousands of organizations worldwide. The unauthenticated nature of the vulnerability means attackers can gain complete system access without any credentials, making it exceptionally dangerous for internet-facing SharePoint deployments.

The active exploitation by multiple threat actors creates an urgent security crisis for organizations relying on SharePoint for critical business operations. For enterprise security teams, this incident demonstrates the ongoing risks of complex enterprise software platforms and the need for robust network segmentation, monitoring, and incident response capabilities to detect and contain sophisticated attacks targeting collaboration infrastructure.


Get the stories that matter to you.
Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Cyber News Centre.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.