Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The real reason Google DeepMind partners with fusion energy startups

A new wave of social media apps brings hope to a world of doomscrolling

North Korean hackers use EtherHiding to hide malware inside blockchain smart contracts

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Chinese companies linked to Silk Typhoons have filed more than 15 patents for Cyberspy Tool
Identity

Chinese companies linked to Silk Typhoons have filed more than 15 patents for Cyberspy Tool

userBy userJuly 30, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 30, 2025Ravi LakshmananEndpoint Security / Cyberspy

Chinese companies, linked to a state-sponsored hacking group known as Silk Timbus (aka Hafnium), have been identified as behind dozens of technology patents, shed light on the shadowy cyber contract ecosystem and its attack capabilities.

The patent covers encrypted endpoint data collection, Apple device forensics, and forensics and intrusion tools that allow remote access to routers and smart home devices, Sentinelone said in a new report shared with Hacker News.

“This new insight into the capabilities of companies affiliated with Hafnium highlights the important flaws in the attribution space of threat actors. Threat actor tracing usually links activity campaigns and clusters to the appointed actor.”

Cybersecurity

“Our research shows not only the individuals behind the attack, but also the companies they work for, the capabilities they have, and how those capabilities enhance the initiatives of state entities that contract with these companies.”

The findings are built on the July 2025 U.S. Department of Justice (DOJ) indictment of Xu Zewei and Zhang Yu, who work on behalf of China’s Department of National Security (MSS).

Court documents alleged that Zewei worked for a company named Shanghai Powerrock Network Co. Ltd., while Yu was employed at Shanghai Firetech Information Science and Technology Company, Ltd. Both individuals are said to be operated at the discretion of the Shanghai National Security Agency (SSSB).

Interestingly, Natto’s idea reported that Powerock registered its business on April 7, 2021 after Microsoft pointed its fingers in China for zero-day exploitation activities. Zewei then joined another well-known cybersecurity company, Chaitin Tech, changed jobs again and began working as IT manager for Shanghai GTA Semiconductor Ltd.

At this stage, Yin Kecheng, a hacker tied to Silk Timson, is said to be employed in a third Chinese company named Shanghai Heiying Information Technology Company, Limited, founded by Chinese patriotic hacker and data broker Zhou Shuai.

“Shanghai Firetech has worked on a specific tasking that was informed by MSS officers,” explained Cary. “Shanghai Firetech and the co-conspirators have achieved a continuous and trustworthy relationship with SSSB, the top regional office of MSS.”

The nature of this ‘direction’ of the relationship between SSSB and these two companies outlines the layered system of Chinese aggressive hacking costumes. ”

Cybersecurity

Further investigation into the web of connections between individuals and their businesses discovered patents filed by Firetech in Shanghai and Shanghai Shilling Commerce Consulting Centre.

There is also evidence to suggest that Shanghai Firetech is also involved in developing solutions that allow for close access operations for interested individuals.

“The various tools under the control of Firetech in Shanghai are publicly outweighing those caused by hafnium and silk typhoons,” Cary said. “This ability may be sold to MSS offices in other regions and is not attributable to hafnium, despite being owned by the same corporate structure.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGoogle has transformed 2 billion smartphones into a global earthquake warning system – it’s just as effective as a seismometer
Next Article Watch as 1,000 baby spiders devour their mothers and aunts.
user
  • Website

Related Posts

North Korean hackers use EtherHiding to hide malware inside blockchain smart contracts

October 16, 2025

Hackers exploit blockchain smart contracts to spread malware via infected WordPress sites

October 16, 2025

LinkPro Linux rootkit uses eBPF to hide and activate via Magic TCP packets

October 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The real reason Google DeepMind partners with fusion energy startups

A new wave of social media apps brings hope to a world of doomscrolling

North Korean hackers use EtherHiding to hide malware inside blockchain smart contracts

Hackers exploit blockchain smart contracts to spread malware via infected WordPress sites

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.