Unravelling Silk Typhoon’s Capabilities

A new report, *China’s Covert Capabilities: Unspooling Silk Spun From Hafnium, published by SentinelLabs on 30 July 2025, exposes the sophisticated cyber espionage tools developed by Chinese firms linked to the state-sponsored hacking group Silk Typhoon, also known as Hafnium.

Authored by Dakota Cary, the report details over ten patents for intrusive data collection technologies registered by companies named in United States indictments for supporting Hafnium’s operations.

As organisations grapple with securing autonomous AI systems, the findings highlight the growing threat of state-backed cyber actors exploiting software vulnerabilities, a concern echoed in recent cybersecurity guidance.

Prolific Threat Actor

Silk Typhoon, directed by China’s Ministry of State Security (MSS), has a storied history of targeting defence contractors, policy think tanks, universities, and infectious disease research institutions. Its most notorious campaign in 2021 exploited zero-day vulnerabilities in Microsoft Exchange Server (MES), compromising thousands of organisations globally.

The report reveals that two indicted hackers, Xu Zewei and Zhang Yu, operated through Shanghai Powerock Network Company and Shanghai Firetech Information Science and Technology Company, respectively, under the Shanghai State Security Bureau (SSSB).

These firms developed tools capable of extracting encrypted endpoint data, conducting mobile forensics, and collecting network traffic, expanding the group’s offensive arsenal.

The report identifies a suite of patented technologies, including software for remotely recovering files from Apple computers, router evidence collection, and hard drive decryption. These capabilities, previously unreported in Hafnium’s tradecraft, suggest a broader scope of operations than publicly documented. This vulnerability is particularly relevant given Silk Typhoon’s history of exploiting software supply chains, as seen in the MES attacks.

The ProxyLogon Fallout

Silk Typhoon’s 2021 MES campaign, exploiting the ProxyLogon vulnerability, had far-reaching consequences. Initially detected in January 2021, the group’s stealthy access to United States government emails triggered a global crisis when other Chinese hacking groups began exploiting the same flaws at scale by late February. This led to widespread deployment of webshells, enabling persistent access to compromised servers even after patches were applied.

The United States Department of Justice (DOJ) responded with a court-authorised operation to remove these shells, a rare intervention reflecting the severity of the breach.

The campaign’s fallout reshaped international cybersecurity policy. In July 2021, the United States, United Kingdom, and European Union issued a joint statement condemning China’s cyber activities, a diplomatic milestone that disrupted China’s ability to block such declarations through European Union dissent. 

The report notes that this coordinated response, coupled with China’s subsequent blending of cyber threat intelligence with state propaganda, was a direct consequence of Silk Typhoon’s actions.

Corporate Connections & MSS Ties

The report delves into the intricate relationships between indicted hackers and their affiliated firms. Xu Zewei and Zhang Yu, directed by the SSSB, operated through Shanghai Powerock and Shanghai Firetech, respectively. Zhang’s company, Shanghai Firetech, also maintains a subsidiary in Chongqing, suggesting a broader operational footprint. The DOJ’s July 2025 indictment of Xu and Zhang, alongside earlier charges against Yin Kecheng and Zhou Shuai, reveals a tiered ecosystem of Chinese cyber contractors. While low-tier firms like i-Soon struggle with unstable contracts, Shanghai Firetech enjoys a trusted relationship with the MSS, handling specific designated tasks.

Shanghai Firetech’s patents, including tools for intelligent home appliance analysis and remote cellphone evidence collection, hint at capabilities suited for human intelligence (HUMINT) operations. These tools, which could enable close-access surveillance, have not been publicly linked to Hafnium’s campaigns, raising questions about their deployment.

The report suggests that these capabilities may have been sold to other MSS regional offices, complicating attribution efforts. 

 Attribution Challenges

The report highlights a critical gap in cyber threat attribution: tracking campaigns often focuses on clusters of activity rather than the organisations behind them. Shanghai Firetech’s extensive toolkit, including unreported capabilities against Apple devices, suggests that some operations may be attributed to other threat actors or remain undetected.

The absence of these tools in public Hafnium tradecraft could reflect their use in covert operations or commercial defensive applications, though no such marketing exists.

A Call for Vigilance

The *Hafnium Spun Silk report clearly demonstrates es the need for enhanced cybersecurity measures, particularly as agentic AI systems introduce new vulnerabilities. The OWASP Securing Agentic Applications Guide 1.0 recommends robust input validation and sandboxing to mitigate risks like those posed by Silk Typhoon’s supply chain attacks.

By exposing the depth of China’s cyber capabilities, the report urges organisations to prioritise visibility and control over software dependencies, ensuring that state-sponsored threats do not exploit the digital fabric of modern systems.

Hacker News  |  NatoThoughts  |   @sentinelOne  |  

Image: Ideogram

You Might Also Read:

Fancy Bear's Anatomy: Tactics, Techniques & Procedures:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« A Guide To Taming Agentic AI Risks
Semperis Ransomware Risk Report Highlights Alarming Trends »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

National Cybersecurity Agency (ANCS) - Tunisia

National Cybersecurity Agency (ANCS) - Tunisia

ANCS (L'Agence Nationale de la Cybersécurité) is the national cybersecurity agency for Tunisia.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

Authorize.Net

Authorize.Net

Authorize.Net is a Payment Gateway which provides the complex infrastructure and security necessary to ensure fast, reliable and secure transactions.

VigiTrust

VigiTrust

VigiTrust is a security firm specializing in cloud based eLearning programs, security compliance portals and providing security assessments.

Cognni

Cognni

Cognni (formerly Shieldox) will make your InfoSec think like a human, right out of the box, so you can focus on the bigger picture, keeping the information flow safe.

KOBIL

KOBIL

KOBIL is a pioneer in the fields of smart card, one-time password, authentication and cryptography.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

GV (Google Ventures)

GV (Google Ventures)

GV provides venture capital funding to bold new companies in the fields of life science, healthcare, artificial intelligence, robotics, transportation, cyber security and agriculture.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

K2 Cyber Security

K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

Evolve Business Group

Evolve Business Group

Evolve is an independently-owned managed network solutions provider, creating bespoke packages for customers globally since 2005.

enQase

enQase

enQase offers security beyond PQC; the only comprehensive, scalable solution that utilizes enhanced quantum technologies to protect data against current and future quantum threats.

Office of Cyber Security and Information Assurance (OCSIA) - Isle of Man

Office of Cyber Security and Information Assurance (OCSIA) - Isle of Man

OCSIA acts as the focal point in developing the Isle of Man’s cyber resilience, working in partnership with private and third sector organisations across the Island alongside the wider population.

Siemba Inc

Siemba Inc

Siemba’s Continuous Threat Exposure Management (CTEM) platform unifies PenTest as a Service, Vulnerability Assessments, Autonomous Pentesting and Attack Surface Mapping delivering actionable insights