Skip to content

Microsoft Warns: Chinese Espionage Group Silk Typhoon Escalates Attacks

Silk Typhoon's sophisticated tactics are targeting various sectors. Microsoft advises patching, securing accounts, and monitoring to mitigate risks.

This is an animation picture. There is a bus with a number plate. On the left side there is a...
This is an animation picture. There is a bus with a number plate. On the left side there is a building with windows. On the right corner there is a watermark. In the background there is a building and sky with clouds.

Microsoft Warns: Chinese Espionage Group Silk Typhoon Escalates Attacks

Microsoft has issued urgent guidance to help organizations combat the increasing threat posed by the Chinese espionage group, Silk Typhoon, also known as Hafnium. The group is exploiting vulnerabilities and abusing credentials to infiltrate networks worldwide.

Silk Typhoon is known for its sophisticated tactics, including the use of covert networks comprising compromised devices to disguise its activities. It has been leveraging unpatched applications to escalate privileges and gain initial access to networks. Recently, Google researchers have warned that organizations in various sectors, such as US technology, legal, and SaaS, have been targeted by BRICKSTORM campaigns attributed to the APT group UNC5221, which is believed to be associated with Silk Typhoon.

The group is abusing stolen API keys, credentials, and conducting password spray attacks to gain access to networks. Once inside, it moves laterally from on-premises environments to cloud infrastructures using techniques like credential theft and compromising Active Directory. To mitigate these risks, Microsoft 365 advises organizations to patch public-facing devices, secure privileged accounts, and monitor for anomalous activity. Companies are also urged to audit service principals, scrutinize multi-tenant applications, and enforce zero-trust principles to limit exposure.

Silk Typhoon has a large targeting footprint, affecting sectors such as IT services, healthcare, government, and higher education, with victims spanning the US and beyond. The group has exploited common IT solutions and cloud applications for initial access, including zero-day vulnerabilities like the one in Ivanti Pulse Connect VPN (CVE-2025-0282). Organizations are advised to stay vigilant and follow Microsoft 365's guidance to protect against these evolving threats.

Read also:

Latest