MSFT released new research on Silk Typhoon's supply chain attacks.
Key shift: Group now heavily leveraging stolen API keys and PAM credentials to hit downstream customers, particularly state/local gov and IT sector targets.
Here's what we know 🧵
Initial access vectors include 0days, compromised third-party services, and password spraying.
Notable: Found several instances of corporate creds exposed via public GitHub repos being used in attacks. (They should be following @InsecureNature)
@InsecureNature Post-compromise, actors use stolen API keys to access downstream customer environments.
Primary focus: Data collection related to China interests, US gov policy, and LE investigations.
@InsecureNature Persistence techniques include admin account resets via API keys, webshell deployment, and creation of additional user accounts.
Actors methodically clear logs related to their activity.
@InsecureNature Group recently exploited Ivanti Pulse Connect VPN 0day (CVE-2025-0282) in January.
Also abusing service principals and OAuth apps with admin perms for email/OneDrive/SharePoint exfil via MSGraph.
@InsecureNature Interesting TTPs: Actors gaining access to existing OAuth-consented apps within tenant, adding their own passwords, then leveraging MSGraph API for email data theft.
Silk Typhoon has one of the largest targeting footprints among Chinese state actors, largely due to their ability to rapidly weaponize 0days.
Group was recently linked to December 2024 OFAC breach, where they leveraged stolen BeyondTrust API key to compromise Treasury dept systems.
Hackers claim to have compromised Gravy Analytics, exposing millions of smartphone location records—including data sold to U.S. government agencies.
This could be the first major breach of a location data broker. Here’s what you need to know 👇
Potential impact:
- Precise GPS coordinates + timestamps on millions of people
- User movement classifications ("LIKELY_DRIVING")
- Customer lists (Apple, Uber, Equifax & more)
- Root access to Gravy's servers, control of domains, and Amazon S3 buckets
For years, firms like Gravy have sold location data to military, DHS, and even the FBI. Now hackers claim to have access dating back to 2018.
Potential risks:
- De-anonymization of individuals
- Tracking high-risk people
- Exposure of schools, clinics, and more
(img: EFF)
New series of Palo Alto Networks vulnerabilities, chained together for a bad time.
“We find that a simple request to that exact endpoint over the web service resets the admin password.”
Well, I don’t like the sound of that… 🧵
First up -
CVE-2024-9464 is an OS command injection vulnerability in Palo Alto Networks Expedition
This allows an authenticated attacker to run arbitrary OS commands as root
Next -
CVE-2024-9465 is an SQL injection vulnerability in Palo Alto Networks Expedition
This allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys.
Woah. Millions of cars can be hacked just by knowing the license plate number.
This is done through a simple web app bug too, no complicated car hacking involved.
I also don't think it's fixed yet... 🧵
The bug seems to impact all Kias right now and the researchers didn't disclose a PoC since it isn't fixed but it's been 90 days since disclosure so they're talking about it.
With just a license plate number, they found a way to use the web portal that dealers and customers use to setup smart car features to ...do a lot more.
Including unlocking, tracking location, even starting the car.