Hafnium (group)

From Wikipedia, the free encyclopedia

Hafnium (sometimes styled HAFNIUM; also called Silk Typhoon by Microsoft[1]) is a cyber espionage group, sometimes known as an advanced persistent threat, with alleged ties to the Chinese government.[2][3][4] Hafnium is closely connected to APT40.[5]

2021 Microsoft Exchange Server data breach[edit]

Microsoft named Hafnium as the group responsible for the 2021 Microsoft Exchange Server data breach, and alleged they were "state-sponsored and operating out of China".[3][4] According to Microsoft, they are based in China but primarily use United States-based virtual private servers,[6] and have targeted "infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks and NGOs".[7]

In July 2021, UK foreign secretary Dominic Raab said the attack had been performed by "Chinese state-backed groups" linked to the Ministry of State Security (MSS).[8][9] The Chinese government has denied responsibility for the 2021 Microsoft breach.[3]

The name "Hafnium" was assigned to the group by Microsoft, which publicly disclosed the group's activity on March 2, 2021. Microsoft described the group as "highly skilled and sophisticated".[10][11] Hafnium is closely connected to APT40.[5]

2022 Tarrask Malware[edit]

Hafnium was linked to the creation of Tarrask, a defense evasion malware used on previous attacks. The malware was used on telecommunications, Internet service providers, and data service companies from August 2021 to February 2022. The malware uses scheduled task abuse to hide payloads delivered to servers.[12]

Capabilities[edit]

In March 2021, it was reported the group had access to the China Chopper web shell, which it has used in the 2021 Microsoft Exchange Server data breach to control hacked servers.[13][14][8]

See also[edit]

References[edit]

  1. ^ "How Microsoft names threat actors". Microsoft. Retrieved 21 January 2024.
  2. ^ "Microsoft accuses China over email cyber-attacks". BBC News. 3 March 2021. Retrieved 10 March 2021.
  3. ^ a b c Kevin, Collier (9 March 2021). "'Really messy': Why the hack of Microsoft's email system is getting worse". NBC News. Retrieved 10 March 2021.
  4. ^ a b "HAFNIUM targeting Exchange Servers with 0-day exploits". Microsoft Security. Microsoft. 2 March 2021. Retrieved 10 March 2021.
  5. ^ a b Mackie, Kurt (19 July 2021). "White House Says China's APT40 Responsible for Exchange Hacks, Ransomware Attacks -- Redmondmag.com". Redmondmag. Retrieved 24 April 2022.
  6. ^ Burt, Tom (2 March 2021). "New nation-state cyberattacks". Microsoft On the Issues. Microsoft. Retrieved 10 March 2021.
  7. ^ ""Hack everybody you can": What to know about the massive Microsoft Exchange breach". www.cbsnews.com. Retrieved 15 March 2021.
  8. ^ a b "China accused of cyber-attack on Microsoft Exchange servers". BBC. 19 July 2021. Retrieved 19 July 2021.
  9. ^ Greenberg, Andy (5 March 2021). "Chinese Hacking Spree Hit an 'Astronomical' Number of Victims". Wired. ISSN 1059-1028. Retrieved 10 March 2021.
  10. ^ "New nation-state cyberattacks". Microsoft On the Issues. 2 March 2021. Retrieved 15 March 2021.
  11. ^ "'Active threat': Chinese hackers target 30,000 US entities". www.aljazeera.com. Retrieved 15 March 2021.
  12. ^ "Microsoft Exposes Evasive Chinese Tarrask Malware Attacking Windows Computers". The Hacker News. Retrieved 17 April 2022.
  13. ^ Osborne, Charlie. "Hafnium's China Chopper: a 'slick' and tiny web shell for creating server backdoors". ZDNet. Retrieved 15 March 2021.
  14. ^ "Exchange Cyberattacks Escalate as Microsoft Rolls One-Click Fix". threatpost.com. Retrieved 16 March 2021.