@turin.medet , 06-03-2025
Cybersecurity experts at Microsoft have observed that the Chinese espionage group known as Silk Typhoon has started using publicly available IT solutions to infiltrate networks. Instead of solely targeting vulnerabilities in critical systems, they are now focusing on everyday tools such as remote management applications and cloud services.
This shift in tactics aligns with trends observed among other advanced espionage groups worldwide. Previously, in May 2024, it was reported that Russian hackers were moving away from custom-developed malware in favor of more accessible malicious software. A similar trend was recorded in Iran in August 2024, where local hackers collaborated with ransomware groups in attacks against the United States.
Exploiting Vulnerabilities
Previously, Silk Typhoon relied on rare zero-day vulnerabilities, scanning weakly protected devices such as firewalls and VPNs. However, they have now also set their sights on widely used solutions that many organizations rely on, including remote management tools and cloud applications.
While Microsoft confirms that its own cloud services have not been directly attacked, Silk Typhoon exploits unpatched applications to infiltrate systems. The group is known for abusing stolen keys and login credentials to compromise target systems, then leveraging this access to penetrate further into networks—including those used by Microsoft—in pursuit of information related to U.S. policy and legislation.
Tactical Shift
This change in tactics affects multiple sectors, from government and healthcare institutions to IT services and educational organizations. By targeting everyday IT tools, Silk Typhoon takes advantage of the fact that many organizations may overlook these applications even when they have up-to-date security measures. Once inside, they employ various techniques to move laterally within networks, access confidential data, and even interfere with email and data storage operations.
Microsoft recommends several key steps to protect against Silk Typhoon:
Always update systems and software, as unpatched vulnerabilities are often the easiest entry points for attackers.
Use strong authentication methods, such as multi-factor authentication and unique passwords, to enhance protection against unauthorized access.
For system administrators, monitoring network activity is crucial to detecting unusual behavior, such as unexpected changes to administrative data that may indicate a security breach. Additionally, organizations should carefully manage API keys and service credentials, restricting access to prevent their exploitation by threat actors.
Современные дети растут в эпоху цифровых технологий — смартфоны, планшеты, социальные сети и онлайн-игры стали неотъемлемой частью их жизни. Интернет открывает массу возможностей для учёбы, творчества и общения, но вместе с этим приносит и серьёзные риски.
@citizensec
30-05-2025Правила использования корпоративной почты: что разрешено, что запрещено, меры безопасности и ответственность.
@CitizenSec
19-05-2025The special edition is dedicated to women in cybersecurity who overcome challenges, inspire others, and make the world safer. We share the stories of three professionals, their paths in cybersecurity, career advice, and tips on online security. Learn how to start your journey in cybersecurity and grow in this dynamic field.
@citizensec
03-05-2025Experts have discovered two dangerous programs that seem harmless at first. These programs can steal personal data, monitor computer activity, and even take control of the system.
@CitizenSec
26-12-2024Thousands of Postman workspaces accidentally revealed sensitive data such as API keys and access tokens. Learn how to secure your API development environment and protect your organization's data.
@CitizenSec
21-11-2024SteelFox was first identified in August 2023, but its activity has increased markedly. More than 11,000 infection attempts have been recorded in recent months.
@CitizenSec
11-11-2024This problem allows hackers to gain unauthorized access to important Android system folders.
@CitizenSec
05-11-2024A Mozilla researcher has proposed a new way to bypass content filters in large language models (LM) used to prevent abuse.
@CitizenSec
01-11-2024Recently, cybersecurity researcher Alexander Hagen has developed a tool that can bypass a new security feature in Google Chrome called App-Bound Encryption.
@CitizenSec
30-10-2024