Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Chinese Firms Tied to Silk Typhoon Patents

July 31, 2025
Reading Time: 3 mins read
in News
UNC2891 Hackers Breach ATMs

Recent investigations have unveiled a startling connection between the notorious state-sponsored hacking group Silk Typhoon, also known as Hafnium, and several Chinese technology companies. A report by SentinelOne reveals these firms have filed over a dozen patents for advanced cyber espionage tools, offering a rare glimpse into China’s state-contracted cyber warfare infrastructure. The patents detail offensive capabilities designed for forensic analysis and intrusion, including tools for collecting encrypted data from endpoints, extracting information from Apple devices, and gaining remote access to routers and smart home devices, fundamentally linking corporate innovation with state-backed espionage.

The Indictments Revealing the Ecosystem

This new understanding is built upon a July 2025 U.S. Department of Justice (DoJ) indictment of individuals linked to the massive 2021 Microsoft Exchange Server hack. The indictment named Xu Zewei, an employee of Shanghai Powerock Network Co. Ltd., and Zhang Yu, who worked for Shanghai Firetech Information Science and Technology Company, Ltd. Both men allegedly acted on behalf of China’s Ministry of State Security (MSS) through its Shanghai State Security Bureau (SSSB). The corporate links provide tangible evidence of the “patriotic hacking” ecosystem, further underscored by the fact that Shanghai Powerock dissolved its business shortly after Microsoft publicly attributed the Exchange hack to China.

A Web of Interconnected Firms and Hackers

The network of corporate-backed hacking extends beyond just two individuals. Yin Kecheng, another hacker associated with Silk Typhoon who was indicted in March 2025, was an employee of a third firm, Shanghai Heiying Information Technology Company. According to Dakota Cary, a strategic advisor for SentinelLabs, these companies operate under direct tasking from MSS officers, forming a tiered system of offensive cyber operations. This “directed” relationship illustrates how the Chinese government leverages the technical expertise of the private sector to achieve its strategic intelligence objectives, creating a trusted, ongoing partnership between state security agencies and corporate contractors.

Patented Tools for Espionage

Digging deeper into the corporate connections, researchers uncovered specific patents filed by Shanghai Firetech and Shanghai Siling Commerce Consulting Center, a firm co-founded by indicted hacker Zhang Yu. These patents explicitly cover methods for collecting “evidence” from Apple devices, routers, and other security equipment. The technology described in these filings points to the development of solutions enabling close-access operations against high-value targets. This formal patenting of espionage tools demonstrates a level of institutionalization and long-term development that goes far beyond individual hacking campaigns.

Broader Implications for Cybersecurity

The discovery that Shanghai Firetech and its affiliates possess such a wide array of tools has significant implications for global cybersecurity. As Cary noted, the variety of capabilities developed by these firms likely “exceeds those attributed to Hafnium and Silk Typhoon publicly.” This suggests that their advanced tools may have been sold or distributed to other regional MSS offices or state-backed groups, meaning their impact could be far more widespread than previously understood. This research highlights a critical gap in threat intelligence, emphasizing the need to track not just individual hackers but also the corporate entities that develop, patent, and profit from the tools of digital espionage.

Reference:

  • Chinese Companies Linked to Silk Typhoon Filed Over 15 Patents for Advanced Cyber Espionage Tools
Tags: Cyber NewsCyber News 2025Cyber threatsJuly 2025
ADVERTISEMENT

Related Posts

Glilot Capital Raises 500 Million Fund

Glilot Capital Raises 500 Million Fund

September 18, 2025
Glilot Capital Raises 500 Million Fund

Researchers Uncover Ransomware Links

September 18, 2025
Glilot Capital Raises 500 Million Fund

DOJ Resentences BreachForums Founder

September 18, 2025
RaccoonO365 Phishing Network Down

RaccoonO365 Phishing Network Down

September 17, 2025
Windows 10 Support Ends in 30 Days

Windows 10 Support Ends in 30 Days

September 17, 2025
RaccoonO365 Phishing Network Down

Exchange 2016, 2019 Support Ends Soon

September 17, 2025

Latest Alerts

FileFix Uses Steganography To Drop StealC

Apple Backports Fix For Exploited Bug

Google Removes 224 Android Malware Apps

ChatGPT Calendar Flaw Lets Email Theft

Windows Update Breaks SMBv1 Shares

Scattered Spider Returns Despite Exit

Subscribe to our newsletter

    Latest Incidents

    AI Forged Military IDs Used In Phishing

    Insight Partners Warns After Data Breach

    ShinyHunters Claims Salesforce Data Theft

    DHS Data Hub Leaked Sensitive Intel

    Worm Infects 180 npm Packages

    Jaguar Land Rover Delays Restart After Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial