Silk Typhoon Hackers from China Target SaaS Providers

Published:

spot_img

Silk Typhoon: A Look into a Disturbing APT Threat

Understanding Silk Typhoon

Recent research from CrowdStrike has shed light on the advanced persistent threat (APT) group known as Silk Typhoon, also referred to as "Murky Panda." This group has showcased a notably advanced capability to breach trusted cloud relationships, putting many organizations at risk.

Exploiting Vulnerabilities

Silk Typhoon has demonstrated a frightening agility in weaponizing both n-day and zero-day vulnerabilities. Notable examples of these vulnerabilities include CVE-2023-3519, which affects Citrix NetScaler ADC and NetScaler Gateway, as well as CVE-2025-3928 concerning Commvault. By exploiting these vulnerabilities, the group can gain initial access to systems, highlighting the need for organizations to stay vigilant about security patches.

Techniques and Operational Methods

CrowdStrike has provided insights into the tactics, techniques, and procedures (TTPs) employed by Silk Typhoon. One of the group’s strategies involves utilizing compromised small office/home office (SOHO) devices as exit nodes. This tactic is common among various Chinese APT groups, allowing them to disguise their operations as legitimate actions within the victim’s geographical region.

Once inside a compromised network, Silk Typhoon often uses Remote Desktop Protocol (RDP), web shells like Neo-reGeorg, and sometimes even employs malware such as CloudedHope to navigate laterally. This enables them to establish a persistent foothold and allows them to pivot toward cloud environments effectively.

Supply Chain Attacks by Silk Typhoon

CrowdStrike highlights Silk Typhoon as one of the few adversaries adept at conducting trusted-relationship compromises in the cloud. According to their findings, this form of attack remains relatively under-monitored compared to more common vectors like authenticating via valid cloud accounts or exploiting public-facing applications.

By leveraging this lesser-known access method, Silk Typhoon likely aims to maintain undetected access to downstream victims, facilitating prolonged infiltration of systems.

Notable Supply Chain Incidents

The research outlines two significant software supply chain attacks by Silk Typhoon. In these incidents, the group exploited zero-day vulnerabilities to gain access to the cloud environments of Software as a Service (SaaS) providers. Their understanding of the compromised environments enabled them to engage in lateral movement to downstream customers.

In one case, at least one SaaS provider managed access via Entra ID. Silk Typhoon reportedly accessed the provider’s application registration secret, allowing them to authenticate as the service principals of the application. This access opened the door to customer environments, ultimately granting them access to sensitive customer data, including emails.

In another instance, the group targeted a Microsoft cloud solution provider, exploiting customer Entra tenants through delegated administrative privileges. By compromising a user in the Admin Agent group, Silk Typhoon gained Global Administrator privileges, which provided them with substantial control across all downstream customer accounts.

Recommendations for Defense

To combat the threats posed by Silk Typhoon, CrowdStrike shares several strategies for detection and prevention. They recommend auditing Entra ID service principals’ credentials, with a particular focus on any newly added credentials.

Additionally, enabling Microsoft Graph activity logs can enhance monitoring capabilities. This allows organizations to track which resources are accessed via Microsoft Graph, including identifying the service principals involved.

Other prudent strategies include proactive hunting for service principal activities that deviate from established norms, as well as monitoring for Entra ID service principal sign-ins originating from unrecognized networks.

In summary, as APT groups like Silk Typhoon continue to evolve, organizations must fortify their defenses and remain vigilant for any signs of intrusion.

spot_img

Related articles

Recent articles

South Africa’s AI Future Depends on Strengthening Network Foundations

South Africa's AI Future Depends on Strengthening Network Foundations As South African organizations increasingly adopt artificial intelligence (AI), the urgency to strengthen digital infrastructure has...

Microsoft’s April Patch Tuesday Addresses 167 Vulnerabilities, Including Critical Exploits in the Wild

Microsoft's April Patch Tuesday Addresses 167 Vulnerabilities, Including Critical Exploits in the Wild Microsoft has reported the discovery of active exploitation in the wild related...

Dark Web Contest Awards $10,000 for Technical Writing on Vulnerability Exploitation

Dark Web Contest Awards $10,000 for Technical Writing on Vulnerability Exploitation In a notable shift within the underground cyber landscape, the TierOne forum has announced...

Kaspersky Report Reveals 1 Million Banking Accounts Compromised as E-Commerce Scams Surge to 85% of Financial Phishing in the Middle East

Kaspersky Report Reveals 1 Million Banking Accounts Compromised as E-Commerce Scams Surge to 85% of Financial Phishing in the Middle East In a significant shift...