Silk Typhoon, a China-linked hacking group previously known as Hafnium, has shifted its strategy to target IT supply chains for initial access to corporate networks. According to Microsoft Threat Intelligence, the group is now focusing on remote management tools, cloud applications, and privilege access management (PAM) services to infiltrate downstream customers. The attackers leverage stolen API keys and credentials to conduct supply chain compromises, targeting sectors including IT, defense, healthcare, government, and NGOs.
The group is also exploiting zero-day vulnerabilities in widely used enterprise solutions, including Ivanti Pulse Connect VPN (CVE-2025-0282), Palo Alto Networks firewalls (CVE-2024-3400), and Citrix NetScaler (CVE-2023-3519). Silk Typhoon’s operations involve persistent web shells, lateral movement across cloud environments, and data exfiltration from Microsoft services via MSGraph API. Their infrastructure includes compromised Zyxel routers and QNAP devices, a signature of Chinese state-sponsored cyber operations.
Expert Analysis:
Silk Typhoon’s expansion into supply chain attacks is a calculated evolution, mirroring Beijing’s long-term strategy of cyber-enabled espionage. Instead of targeting individual organizations, they are now compromising the digital arteries that connect entire industries. The use of stolen API keys and cloud services highlights a shift away from brute-force intrusion towards a more surgical approach, exploiting systemic weaknesses in enterprise IT management.
This isn’t just espionage; it’s strategic positioning for long-term access. Organizations that continue to rely on outdated perimeter defenses are effectively rolling out the red carpet for these adversaries.
Read the full article here.