China-Nexus Hacker Group Silk Typhoon Targeting Cloud Environments

Want latest news insights in your inbox? Sign up for our weekly newsletters to get only what matters to your organization. Subscribe Now

 

Security researchers are warning about a surge in cyberattacks linked to the China-based threat actor Silk Typhoon (also known as Murky Panda), which has been actively targeting government agencies, technology firms, and SaaS providers across North America.

 

According to a new report from CrowdStrike, the group is exploiting zero-day vulnerabilities in Citrix and Commvault products to infiltrate cloud environments and pivot into downstream customer networks.

Exploiting Critical Flaws

Silk Typhoon has leveraged several high-risk vulnerabilities, including:

  • CVE-2023-3519 – affecting Citrix Netscaler ADC and Citrix Gateway

  • CVE-2025-3928 – affecting Commvault devices

The group has also compromised small-office and home-office routers and abused weaknesses in Microsoft Entra ID (formerly Azure AD) service principals and delegated access permissions to escalate intrusions.

Adam Meyers, Head of Counter Adversary Operations at CrowdStrike, explained:

“What makes this group concerning is its ability to compromise trusted cloud and SaaS relationships to move downstream into customer environments. We’ve seen them turn identity infrastructure into a launchpad.”

Cloud-to-Customer Attacks

In one case, Silk Typhoon gained access to an application registration secret in Entra ID, which enabled them to compromise downstream customer environments.
In another incident, they breached a Microsoft cloud solutions provider and leveraged delegated administrative privileges to access customer systems.

Defensive Measures

CrowdStrike advises organizations to:

  • Patch vulnerabilities in Citrix, Commvault, and other internet-facing appliances

  • Harden cloud identity configurations to limit delegated permissions

  • Monitor for unusual activity across SaaS platforms and edge devices

The campaign underscores how advanced nation-state actors are increasingly focusing on cloud and SaaS ecosystems, exploiting trusted provider relationships to expand their reach and compromise critical infrastructure.

📬 Want to stay ahead of emerging cybersecurity challenges like this?
Subscribe to our newsletter for weekly insights, updates, and expert analysis.