Back to the blog

Silk Typhoon abusing IT providers and stolen credentials in supply chain attacks

Microsoft Threat Intelligence revealed that Silk Typhoon is exploiting stolen API keys, OAuth credentials, and PAM credentials in supply chain attacks.

What Happened?

Microsoft Threat Intelligence revealed that Silk Typhoon, a sophisticated Chinese espionage group, is increasingly exploiting stolen API keys, OAuth credentials, and Privileged Access Management (PAM) credentials in supply chain attacks. The group specifically targets service services, cloud applications, and IT providers to gain unauthorized access and compromise downstream customers, particularly affecting state and local governments, as well as IT sector entities.

‍

Exploitation Methods

  • Initial Access: Leveraging zero-day vulnerabilities, compromised third-party services, and password spraying.
  • Credential Abuse: Utilizing stolen corporate credentials exposed in public GitHub repositories.
  • API Key Misuse: Employing stolen API keys to infiltrate customer environments, access sensitive data, and maintain persistent access.
  • OAuth App Manipulation: Hijacking existing OAuth apps with administrative privileges, adding attacker-controlled passwords, and extracting email, OneDrive, and SharePoint data via the Microsoft Graph API.

‍

Persistence and Evasion

  • Resetting administrative accounts through compromised API keys.
  • Deploying web shells and creating unauthorized user accounts.
  • Methodically clearing logs to evade detection and obscure activities.

‍

Notable Incidents

  • Exploited Ivanti Pulse Connect VPN zero-day vulnerability (CVE-2025-0282).
  • Compromised Treasury Department using stolen BeyondTrust API keys in the December 2024 breach.

‍

Recommended Actions

Related posts

Report

Debunking the "stupid user" myth
in security

Exploring the influence of employees’ perception
and emotions on security behaviors