Microsoft has issued a warning regarding an advanced Chinese hacking group known as Silk Typhoon, which has shifted its tactics to target IT supply chains. This change in strategy includes exploiting remote management tools and cloud applications to gain initial access to networks, facilitating large-scale espionage. The group, linked to the Chinese government, has moved away from exploiting vulnerabilities in Microsoft Exchange and is now leveraging stolen API keys and Privileged Access Management (PAM) credentials. This new approach particularly affects state and local government entities, as well as the IT sector. The warning follows a report from Microsoft that highlights the ongoing threat posed by Silk Typhoon, which has been active in cyber espionage campaigns aimed at both U.S. and international organizations since late 2024.
Microsoft da la voz de alarma ante un grupo de hackers chinos que está espiando sus servidores: busca los secretos de Estados Unidos https://t.co/u8JiLRwyX5 https://t.co/Bo5QgThPNV
Chinese Lotus Blossom APT targets multiple sectors with Sagerunex backdoor: https://t.co/O0xD0q9Za3 by Security Affairs #infosec #cybersecurity #technology #news
微软周三在其威胁情报博客上表示,已发现Silk Typhoon的策略发生了转变,该组织是一个中国政府支持的专注于间谍活动的黑客组织,其正转向使用远程管理工具和云应用程序来渗透目标组织。https://t.co/nOex3jidek