China's Silk Typhoon, Tied To US Treasury Break-in, Now Hammers IT And Govt Targets

Updated Silk Typhoon, the Chinese government crew believed to be behind the December US Treasury intrusions, has been abusing stolen API keys and cloud credentials in ongoing attacks targeting IT companies and state and local government agencies since late 2024, according to Microsoft Threat Intelligence.

The timing of this campaign coincides with that break-in at the US Treasury Department, during which Beijing's cyberspies stole data from workstations belonging to the Office of Foreign Assets Control (OFAC), which administers economic and trade sanctions, as well as the Office of the Treasury Secretary.

These intrusions were attributed to Silk Typhoon, according to a Bloomberg report citing unnamed sources, and the Chinese snoops are believed to have gained access after stealing a BeyondTrust digital key used for remote technical support.

And now it appears that the group's victims extended beyond the federal government agency.

"Since late 2024, Microsoft Threat Intelligence has conducted thorough research and tracked ongoing attacks performed by Silk Typhoon," Redmond said Wednesday, noting that stolen API keys and credentials are Silk Typhoon's preferred means of breaking into victims' environments.

After slipping into organizations via compromised API keys, President Xi's agents snoop around and collect data on devices using an administrative account, specifically looking for information that "overlaps with China-based interests," such as US government policy, legal processes, and documents related to law enforcement investigations.

This espionage campaign also highlights Silk Typhoon's changing tactics, which now include targeting remote management tools and cloud applications to gain initial access, we're told.

Silk Typhoon is the team that Microsoft previously tracked as Hafnium. Prior to the Treasury snooping, it was probably best known for the 2021 Microsoft Exchange Server security breaches during which the spies exploited four zero-day vulnerabilities to get into the inboxes of US-based defense contractors, law firms, and infectious disease researchers, and steal their data.

More recently, in January, Silk Typhoon was observed exploiting CVE-2025-0282, a zero-day vulnerability in the public-facing Ivanti Pulse Connect VPN, according to Microsoft.

In 2024, Redmond's threat intel crew reported spotting Silk Typhoon compromising CVE-2023-3519, a zero-day vulnerability in Citrix NetScaler ADC and NetScaler Gateways, along with CVE-2024-3400, a zero-day in Palo Alto Networks firewalls, to compromise "multiple organizations." ®

Updated to add

Also today, US prosecutors charged 12 Chinese nationals over their alleged roles within the Silk Typhoon team.

RECENT NEWS

From Chip War To Cloud War: The Next Frontier In Global Tech Competition

The global chip war, characterized by intense competition among nations and corporations for supremacy in semiconductor ... Read more

The High Stakes Of Tech Regulation: Security Risks And Market Dynamics

The influence of tech giants in the global economy continues to grow, raising crucial questions about how to balance sec... Read more

The Tyranny Of Instagram Interiors: Why It's Time To Break Free From Algorithm-Driven Aesthetics

Instagram has become a dominant force in shaping interior design trends, offering a seemingly endless stream of inspirat... Read more

The Data Crunch In AI: Strategies For Sustainability

Exploring solutions to the imminent exhaustion of internet data for AI training.As the artificial intelligence (AI) indu... Read more

Google Abandons Four-Year Effort To Remove Cookies From Chrome Browser

After four years of dedicated effort, Google has decided to abandon its plan to remove third-party cookies from its Chro... Read more

LinkedIn Embraces AI And Gamification To Drive User Engagement And Revenue

In an effort to tackle slowing revenue growth and enhance user engagement, LinkedIn is turning to artificial intelligenc... Read more