Hafnium (group)
Type | Cyber espionage group, Advanced persistent threat |
---|---|
Purpose | State-sponsored cyber espionage |
Headquarters | Allegedly China |
Region served | Globally |
Membership | Unknown |
Main organ | Allegedly Ministry of State Security |
Affiliations | APT40 |
Remarks | Also known as Silk Typhoon |
Hafnium (sometimes styled HAFNIUM; also called Silk Typhoon by Microsoft[1]) is a cyber espionage group, sometimes known as an advanced persistent threat, with alleged ties to the Chinese government, particularly its Ministry of State Security.[2][3][4] Hafnium is closely connected to APT40.[5]
History
2021 Microsoft Exchange Server data breach
Microsoft named Hafnium as the group responsible for the 2021 Microsoft Exchange Server data breach, and alleged they were "state-sponsored and operating out of China".[3][4] According to Microsoft, they are based in China but primarily use United States–based virtual private servers,[6] and have targeted "infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks and NGOs".[7]
In July 2021, UK foreign secretary Dominic Raab said the attack had been performed by "Chinese state-backed groups" linked to the Ministry of State Security (MSS).[8][9] The Chinese government has denied responsibility for the 2021 Microsoft breach.[3]
The name "Hafnium" was assigned to the group by Microsoft, which publicly disclosed the group's activity on March 2, 2021. Microsoft described the group as "highly skilled and sophisticated".[10][11] Hafnium is closely connected to APT40.[5]
2022 Tarrask Malware
Hafnium was linked to the creation of Tarrask, a defense evasion malware used on previous attacks. The malware was used on telecommunications, Internet service providers, and data service companies from August 2021 to February 2022. The malware uses scheduled task abuse to hide payloads delivered to servers.[12]
2025
In July 2025, a hacker allegedly working with Hafnium, Xu Zewei, was arrested in Milan and faces extradition to the United States.[13][14] The same month, Silk Typhoon exploited a security flaw in SharePoint, affecting thousands of servers.[15][16]
Capabilities
In March 2021, it was reported the group had access to the China Chopper web shell, which it has used in the 2021 Microsoft Exchange Server data breach to control hacked servers.[17][18][8]
See also
References
- ^ "How Microsoft names threat actors". Microsoft. Archived from the original on 10 July 2024. Retrieved 21 January 2024.
- ^ "Microsoft accuses China over email cyber-attacks". BBC News. 3 March 2021. Archived from the original on 22 July 2021. Retrieved 10 March 2021.
- ^ a b c Kevin, Collier (9 March 2021). "'Really messy': Why the hack of Microsoft's email system is getting worse". NBC News. Archived from the original on 22 July 2021. Retrieved 10 March 2021.
- ^ a b "HAFNIUM targeting Exchange Servers with 0-day exploits". Microsoft Security. Microsoft. 2 March 2021. Archived from the original on 24 July 2021. Retrieved 10 March 2021.
- ^ a b Mackie, Kurt (19 July 2021). "White House Says China's APT40 Responsible for Exchange Hacks, Ransomware Attacks -- Redmondmag.com". Redmondmag. Archived from the original on 17 May 2022. Retrieved 24 April 2022.
- ^ Burt, Tom (2 March 2021). "New nation-state cyberattacks". Microsoft On the Issues. Microsoft. Archived from the original on 2 March 2021. Retrieved 10 March 2021.
- ^ ""Hack everybody you can": What to know about the massive Microsoft Exchange breach". www.cbsnews.com. Archived from the original on 15 March 2021. Retrieved 15 March 2021.
- ^ a b "China accused of cyber-attack on Microsoft Exchange servers". BBC. 19 July 2021. Archived from the original on 19 July 2021. Retrieved 19 July 2021.
- ^ Greenberg, Andy (5 March 2021). "Chinese Hacking Spree Hit an 'Astronomical' Number of Victims". Wired. ISSN 1059-1028. Archived from the original on 26 May 2021. Retrieved 10 March 2021.
- ^ "New nation-state cyberattacks". Microsoft On the Issues. 2 March 2021. Archived from the original on 2 March 2021. Retrieved 15 March 2021.
- ^ "'Active threat': Chinese hackers target 30,000 US entities". www.aljazeera.com. Archived from the original on 15 March 2021. Retrieved 15 March 2021.
- ^ "Microsoft Exposes Evasive Chinese Tarrask Malware Attacking Windows Computers". The Hacker News. Archived from the original on 17 April 2022. Retrieved 17 April 2022.
- ^ "America is coming after Chinese it accuses of hacking". The Economist. 10 July 2025. ISSN 0013-0613. Archived from the original on 10 July 2025. Retrieved 13 July 2025.
- ^ Singh, Kanishka; Ward, Jasper; Singh, Kanishka; Ward, Jasper (10 July 2025). "Chinese state-sponsored contract hacker arrested in Italy at US request, DOJ says". Reuters. Archived from the original on 8 July 2025. Retrieved 14 July 2025.
- ^ Menn, Joseph; Nakashima, Ellen; Yahr, Emily; Schwartzman, Paul; Sotomayor, Marianna; Goba, Kadia; Sima, Richard; Wen, Leana (22 July 2025). "China-backed hackers used Microsoft flaw in attacks, defenders say". The Washington Post. ISSN 0190-8286. Archived from the original on 22 July 2025. Retrieved 23 July 2025.
- ^ "What to know about a vulnerability being exploited on Microsoft SharePoint servers". Associated Press. 21 July 2025. Archived from the original on 22 July 2025. Retrieved 23 July 2025.
- ^ Osborne, Charlie. "Hafnium's China Chopper: a 'slick' and tiny web shell for creating server backdoors". ZDNet. Archived from the original on 15 March 2021. Retrieved 15 March 2021.
- ^ "Exchange Cyberattacks Escalate as Microsoft Rolls One-Click Fix". threatpost.com. 16 March 2021. Archived from the original on 16 March 2021. Retrieved 16 March 2021.