Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools

Posted on July 30, 2025July 30, 2025 By CWS

Jul 30, 2025Ravie LakshmananEndpoint Safety / Cyber Espionage
Chinese language firms linked to the state-sponsored hacking group often known as Silk Storm (aka Hafnium) have been recognized as behind over a dozen know-how patents, shedding mild on the shadowy cyber contracting ecosystem and its offensive capabilities.
The patents cowl forensics and intrusion instruments that allow encrypted endpoint knowledge assortment, Apple machine forensics, and distant entry to routers and sensible dwelling gadgets, SentinelOne stated in a brand new report shared with The Hacker Information.
“This new perception into the Hafnium-affiliated companies’ capabilities highlights an essential deficiency within the menace actor attribution area: menace actor monitoring sometimes hyperlinks campaigns and clusters of exercise to a named actor,” Dakota Cary, China-focused strategic advisor for SentinelLabs, stated.

“Our analysis demonstrates the power in figuring out not solely the people behind assaults, however the firms they work for, the capabilities these firms have, and the way these capabilities fortify the initiatives of the state entities who contract with these companies.”
The findings construct upon the U.S. Division of Justice’s (DoJ) July 2025 indictment of Xu Zewei and Zhang Yu, who, engaged on behalf of China’s Ministry of State Safety (MSS), are accused of orchestrating the widespread exploitation marketing campaign in 2021 geared toward Microsoft Alternate Server utilizing then-zero-days dubbed ProxyLogon.
Courtroom paperwork alleged that Zewei labored for a corporation named Shanghai Powerock Community Co. Ltd., whereas Yu was employed at Shanghai Firetech Info Science and Expertise Firm, Ltd. Each people are stated to have operated beneath the discretion of the Shanghai State Safety Bureau (SSSB).

Apparently, Natto Ideas reported that Powerock deregistered its enterprise on April 7, 2021, a bit of over a month after Microsoft pointed fingers at China for the zero-day exploitation exercise. Zewei would then go on to affix Chaitin Tech, one other distinguished cybersecurity agency, solely to alter jobs once more and start working as an IT supervisor at Shanghai GTA Semiconductor Ltd.
It is price mentioning right here at this stage that Yin Kecheng, a hacker tied to Silk Storm, is alleged to have been employed at a 3rd Chinese language agency named Shanghai Heiying Info Expertise Firm, Restricted, which was established by Zhou Shuai, a Chinese language patriotic hacker and purported knowledge dealer.
“Shanghai Firetech labored on particular tasking handed down from MSS officers,” Cary defined. “Shanghai Firetech and co-conspirators earned an on-going, trusting relationship with the MSS’s premier regional workplace, the SSSB.”
“This ‘directed’ nature of the connection between the SSSB and these two firms contours the tiered system of offensive hacking outfits in China.”

Additional investigation into the net of connections between the people and their firms has uncovered patents filed by Shanghai Firetech and Shanghai Siling Commerce Consulting Heart, a agency collectively based by Yu and Yin Wenji, CEO of Shanghai Firetech to gather “proof” from Apple gadgets, routers, and defensive tools.
There’s additionally proof to counsel that Shanghai Firetech can be engaged in growing options that would allow shut entry operations in opposition to people of curiosity.
“The number of instruments beneath the management of Shanghai Firetech exceeds these attributed to Hafnium and Silk Storm publicly,” Cary stated. “The capabilities could have been bought to different regional MSS workplaces, and thus not attributed to Hafnium, regardless of being owned by the identical company construction.”

The Hacker News Tags:Chinese, Cyber, Espionage, Filed, Firms, Linked, Patents, Silk, Tools, Typhoon

Post navigation

Previous Post: Cost of Data Breach in US Rises to $10.22 Million, Says Latest IBM Report
Next Post: Lumma Password Stealer Attack Infection Chain and Its Escalation Tactics Uncovered

Related Posts

Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence The Hacker News
Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools The Hacker News
Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine The Hacker News
AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation The Hacker News
U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation The Hacker News
Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity
  • Navigating APTs – Singapore’s Cautious Response to State-Linked Cyber Attacks
  • Silver Fox Hackers Using Weaponized Google Translate Tools to Deploy Windows Malware
  • How to Review Privacy Policies Efficiently
  • Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity
  • Navigating APTs – Singapore’s Cautious Response to State-Linked Cyber Attacks
  • Silver Fox Hackers Using Weaponized Google Translate Tools to Deploy Windows Malware
  • How to Review Privacy Policies Efficiently
  • Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News