WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships (TLP:CLEAR) Silk Typhoon, Another Chinese-Affiliated Threat Actor, Targets IT Supply Chains
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP:CLEAR) Silk Typhoon, Another Chinese-Affiliated Threat Actor, Targets IT Supply Chains

TLP:CLEAR

Author: Chase Snow

Created: Thursday, March 6, 2025 - 15:47

Categories: Cybersecurity, Security Preparedness

Summary: Yesterday, in a blog post, Microsoft Threat Intelligence shared new details about the Chinese-affiliated cyber threat actor known as Silk Typhoon. They warn that Silk Typhoon is targeting remote management tools and cloud services in supply chain attacks that give them access to downstream customers. Microsoft has confirmed breaches across multiple sectors including government, IT services, healthcare, defense, education, NGOs, and energy.  

Analyst Note: Silk Typhoon has gained notoriety in recent months after being linked to the U.S. Treasury Incident in late December, 2024. Microsoft has mentioned a shift in the group’s tactics away from focusing on organization-level breaches and towards Managed Service Provider (MSP) and cloud-level attacks allowing them to move within cloud environments, including stealing Active Directory credentials and abusing OAuth applications creating a much stealthier attack.

Members are encouraged to review Microsoft’s list of updated indicators of compromise (IOCs) and detection rules that reflect Silk Typhoon’s latest shift in tactics and add them to their security tools to timely detect and block any potential attacks. Utilities that outsource technology support are urged to consult with their support vendors for assistance in recognizing and searching for these indicators and with applying the detection rules mentioned.

Original Source: https://www.microsoft.com/en-us/security/blog/2025/03/05/silk-typhoon-targeting-it-supply-chain/

Additional Reading:

  • Silk Typhoon hackers now target IT supply chains to breach networks
  • US Treasury hack linked to Silk Typhoon Chinese state hackers

Mitigation Recommendations:

  • Silk Typhoon targeting IT supply chain

Related WaterISAC PIRs: 6, 6.1, 7, 7.1, 10, 10.2, 11, 12

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar