Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Chinese silk typhoon extends cyber-napades to IT chains for initial access
Global Security

Chinese silk typhoon extends cyber-napades to IT chains for initial access

AdminBy AdminMarch 5, 2025No Comments3 Mins Read
Cyber Attacks to IT Supply Chains
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


05 March 2025Red LakshmananNetwork safety / data violation

Cyberattacks to IT Declaration of Supply

In January 2021, the actor threatened in China, which stands for the operation of security deficiencies in Microsoft Exchange Servers in January 2021 to focus on the supply chain of information technology as a means to obtain initial access to corporate networks.

This is according to new findings by the Microsoft intelligence group that said Silk typhoon (Previously Hafnium) Hacking Group is now aimed at IT -solutions such as remote control and cloud applications to get securing.

“After a successful compromise victim silk typhoon uses stolen keys and powers to penetrate the customer network, where they can abuse different detailed applications, including Microsoft Services and other – Note In a report published today.

The team of the competition is evaluated as “well -reviewed and technically effective”, trying to use feats for vulnerability of zero days in the edge devices for conjunctural attacks that allow them to scale their attacks on scale and in a wide range of sectors and regions.

Cybersecurity

This includes the services and infrastructure of information technology (IT), companies engaged in distance monitoring and management (RMM), managed service providers (MSPS) and branches, health care services, higher education, governments, non -governmental organizations (NGOs).

Silk -Tetifun is also observed, based on different web races to achieve commands, perseverance and expressive data from the victim’s environment. It is also said to have demonstrated a deep understanding of cloud infrastructure, which further allowed it to move to the lateral and crops of interest.

At least from the end of 2024, the attackers have been associated with a new set of methods, the main one of which concerns abuse of API keys and powers related to the management of access privileges (PAM), cloud applications and cloud -duty companies to compromise.

“Using the access obtained through the API key, the actor conducted intelligence and gathering data on the target devices through the administrator account,” Microsoft said, adding the goals of this activity, mostly covered the state and local authorities, as well as the IT sector.

Some of the other initial access routes takenCve-2025-0282) and the use of attacks on the password spray using the accounts of the enterprises that arose from password leaks on public repositories located on GitHub and others.

Also used by actor threats as zero day –

  • Cve-2024-3400Lack of commands in Palo Alto Networks Firewalls
  • Cve-2023-3519Vulnerability of unauthorized remote code (RCE) that affects Citrix NetsCale app controller
  • Cve-2021-2685 (A Proxylonogon), CVE-2011-26857, Cve-2011-26858 and Cve-2011-27065, A A set of vulnerabilities Impact on the Microsoft Exchange server
Cybersecurity

Successful initial access is accompanied by the actor threats taken by transition from laterally from local conditions to cloud environments, as well as use OAUTH applications with administrative permits to execute email, OneDrive and SharePoint, which exports of data via MSGRAP API.

In an attempt to delay the origin of their malicious classes, the silk typhoon rests on “COVERTNETWORK“Complex compromises of cyber confusion, Zyxel and Qnap devices, a feature of several Chinese state actors.

“During the recent activities and historical operation of these devices, the silk typhoon used different web -supporters to maintain persistence and resolution to the actors to access the victims distance,” Microsoft said.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.