Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Chinese Firms Tied to Silk Typhoon Patents

July 31, 2025
Reading Time: 3 mins read
in News
UNC2891 Hackers Breach ATMs

Recent investigations have unveiled a startling connection between the notorious state-sponsored hacking group Silk Typhoon, also known as Hafnium, and several Chinese technology companies. A report by SentinelOne reveals these firms have filed over a dozen patents for advanced cyber espionage tools, offering a rare glimpse into China’s state-contracted cyber warfare infrastructure. The patents detail offensive capabilities designed for forensic analysis and intrusion, including tools for collecting encrypted data from endpoints, extracting information from Apple devices, and gaining remote access to routers and smart home devices, fundamentally linking corporate innovation with state-backed espionage.

The Indictments Revealing the Ecosystem

This new understanding is built upon a July 2025 U.S. Department of Justice (DoJ) indictment of individuals linked to the massive 2021 Microsoft Exchange Server hack. The indictment named Xu Zewei, an employee of Shanghai Powerock Network Co. Ltd., and Zhang Yu, who worked for Shanghai Firetech Information Science and Technology Company, Ltd. Both men allegedly acted on behalf of China’s Ministry of State Security (MSS) through its Shanghai State Security Bureau (SSSB). The corporate links provide tangible evidence of the “patriotic hacking” ecosystem, further underscored by the fact that Shanghai Powerock dissolved its business shortly after Microsoft publicly attributed the Exchange hack to China.

A Web of Interconnected Firms and Hackers

The network of corporate-backed hacking extends beyond just two individuals. Yin Kecheng, another hacker associated with Silk Typhoon who was indicted in March 2025, was an employee of a third firm, Shanghai Heiying Information Technology Company. According to Dakota Cary, a strategic advisor for SentinelLabs, these companies operate under direct tasking from MSS officers, forming a tiered system of offensive cyber operations. This “directed” relationship illustrates how the Chinese government leverages the technical expertise of the private sector to achieve its strategic intelligence objectives, creating a trusted, ongoing partnership between state security agencies and corporate contractors.

Patented Tools for Espionage

Digging deeper into the corporate connections, researchers uncovered specific patents filed by Shanghai Firetech and Shanghai Siling Commerce Consulting Center, a firm co-founded by indicted hacker Zhang Yu. These patents explicitly cover methods for collecting “evidence” from Apple devices, routers, and other security equipment. The technology described in these filings points to the development of solutions enabling close-access operations against high-value targets. This formal patenting of espionage tools demonstrates a level of institutionalization and long-term development that goes far beyond individual hacking campaigns.

Broader Implications for Cybersecurity

The discovery that Shanghai Firetech and its affiliates possess such a wide array of tools has significant implications for global cybersecurity. As Cary noted, the variety of capabilities developed by these firms likely “exceeds those attributed to Hafnium and Silk Typhoon publicly.” This suggests that their advanced tools may have been sold or distributed to other regional MSS offices or state-backed groups, meaning their impact could be far more widespread than previously understood. This research highlights a critical gap in threat intelligence, emphasizing the need to track not just individual hackers but also the corporate entities that develop, patent, and profit from the tools of digital espionage.

Reference:

  • Chinese Companies Linked to Silk Typhoon Filed Over 15 Patents for Advanced Cyber Espionage Tools
Tags: Cyber NewsCyber News 2025Cyber threatsJuly 2025
ADVERTISEMENT

Related Posts

Credit Card Fraud Ring Busted

November 5, 2025

Cybercrime Groups Join Forces

November 5, 2025

US Sanctions 10 North Korean Entities

November 5, 2025
Google Search AI Mode Knows Everything

Proton Launches Data Breach Observatory

November 4, 2025
Google Search AI Mode Knows Everything

Google AI Blocks 10B Scam Messages

November 4, 2025
Google Search AI Mode Knows Everything

Google Search AI Mode Knows Everything

November 4, 2025

Latest Alerts

SkyCloak Backdoor Targets Defense Firms

Teams Bugs Let Hackers Impersonate

Post SMTP Plugin Hijacks Admins

React Native CLI Flaw Exposed

Smudged Serpent Targets US Experts

CISA Warns Linux Flaw Exploited

Subscribe to our newsletter

    Latest Incidents

    Belgian Telecoms Hit By Cyberattack

    Sandworm Wipers Hit Ukraines Grain Hub

    Hackers Target UK Water Suppliers

    Nikkei Data Breach Hits 17000

    Apache OpenOffice Denies Breach

    Cybercriminals Exploit Remote Monitoring

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial