Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools

Posted on July 30, 2025July 30, 2025 By CWS

Jul 30, 2025Ravie LakshmananEndpoint Safety / Cyber Espionage
Chinese language firms linked to the state-sponsored hacking group often known as Silk Storm (aka Hafnium) have been recognized as behind over a dozen know-how patents, shedding mild on the shadowy cyber contracting ecosystem and its offensive capabilities.
The patents cowl forensics and intrusion instruments that allow encrypted endpoint knowledge assortment, Apple machine forensics, and distant entry to routers and sensible dwelling gadgets, SentinelOne stated in a brand new report shared with The Hacker Information.
“This new perception into the Hafnium-affiliated companies’ capabilities highlights an essential deficiency within the menace actor attribution area: menace actor monitoring sometimes hyperlinks campaigns and clusters of exercise to a named actor,” Dakota Cary, China-focused strategic advisor for SentinelLabs, stated.

“Our analysis demonstrates the power in figuring out not solely the people behind assaults, however the firms they work for, the capabilities these firms have, and the way these capabilities fortify the initiatives of the state entities who contract with these companies.”
The findings construct upon the U.S. Division of Justice’s (DoJ) July 2025 indictment of Xu Zewei and Zhang Yu, who, engaged on behalf of China’s Ministry of State Safety (MSS), are accused of orchestrating the widespread exploitation marketing campaign in 2021 geared toward Microsoft Alternate Server utilizing then-zero-days dubbed ProxyLogon.
Courtroom paperwork alleged that Zewei labored for a corporation named Shanghai Powerock Community Co. Ltd., whereas Yu was employed at Shanghai Firetech Info Science and Expertise Firm, Ltd. Each people are stated to have operated beneath the discretion of the Shanghai State Safety Bureau (SSSB).

Apparently, Natto Ideas reported that Powerock deregistered its enterprise on April 7, 2021, a bit of over a month after Microsoft pointed fingers at China for the zero-day exploitation exercise. Zewei would then go on to affix Chaitin Tech, one other distinguished cybersecurity agency, solely to alter jobs once more and start working as an IT supervisor at Shanghai GTA Semiconductor Ltd.
It is price mentioning right here at this stage that Yin Kecheng, a hacker tied to Silk Storm, is alleged to have been employed at a 3rd Chinese language agency named Shanghai Heiying Info Expertise Firm, Restricted, which was established by Zhou Shuai, a Chinese language patriotic hacker and purported knowledge dealer.
“Shanghai Firetech labored on particular tasking handed down from MSS officers,” Cary defined. “Shanghai Firetech and co-conspirators earned an on-going, trusting relationship with the MSS’s premier regional workplace, the SSSB.”
“This ‘directed’ nature of the connection between the SSSB and these two firms contours the tiered system of offensive hacking outfits in China.”

Additional investigation into the net of connections between the people and their firms has uncovered patents filed by Shanghai Firetech and Shanghai Siling Commerce Consulting Heart, a agency collectively based by Yu and Yin Wenji, CEO of Shanghai Firetech to gather “proof” from Apple gadgets, routers, and defensive tools.
There’s additionally proof to counsel that Shanghai Firetech can be engaged in growing options that would allow shut entry operations in opposition to people of curiosity.
“The number of instruments beneath the management of Shanghai Firetech exceeds these attributed to Hafnium and Silk Storm publicly,” Cary stated. “The capabilities could have been bought to different regional MSS workplaces, and thus not attributed to Hafnium, regardless of being owned by the identical company construction.”

The Hacker News Tags:Chinese, Cyber, Espionage, Filed, Firms, Linked, Patents, Silk, Tools, Typhoon

Post navigation

Previous Post: Cost of Data Breach in US Rises to $10.22 Million, Says Latest IBM Report
Next Post: Lumma Password Stealer Attack Infection Chain and Its Escalation Tactics Uncovered

Related Posts

Transforming Your Cybersecurity Practice Into An MRR Machine The Hacker News
BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware The Hacker News
Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers The Hacker News
OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors The Hacker News
17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge The Hacker News
CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks
  • Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data
  • GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks
  • Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data
  • GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News