Chinese APTs Murky Panda, Genesis Panda, and Glacial Panda escalate cloud and telecom espionage
Summary
Hide β²
Show βΌ
Murky Panda, also known as Silk Typhoon, Genesis Panda, and Glacial Panda, three China-nexus cyber espionage groups, have escalated their activities targeting cloud and telecom sectors. Murky Panda exploits trusted cloud relationships and zero-day vulnerabilities to breach enterprise networks. Genesis Panda targets cloud service providers to expand access and establish persistence. Glacial Panda targets telecommunications organizations to exfiltrate call detail records and related communications telemetry. The groups leverage various TTPs, including exploiting internet-facing appliances, known vulnerabilities, and living-off-the-land techniques. Their operations are driven by intelligence gathering and maintaining stealth and persistence. Murky Panda has been observed exploiting the CVE-2025-0282 vulnerability in Ivanti Pulse Connect VPN, zero-day vulnerabilities in SaaS providers' cloud environments, and delegated administrative privileges (DAP) in Microsoft cloud solution providers to gain Global Administrator rights across all downstream tenants. The group uses compromised SOHO devices as proxy servers to blend malicious traffic with normal traffic and deploys web shells like Neo-reGeorg and China Chopper to establish persistence.
Timeline
-
22.08.2025 14:06 π° 3 articles Β· β± 25d ago
Murky Panda exploits trusted cloud relationships and zero-day vulnerabilities
Murky Panda has been observed abusing trusted cloud relationships to breach enterprise networks. The group exploits zero-day vulnerabilities in SaaS providers' cloud environments to conduct lateral movement. In late 2024, Murky Panda compromised a supplier of a North American entity and used the supplier's administrative access to add a temporary backdoor Entra ID account, backdooring several preexisting Entra ID service principles related to Active Directory management and emails. Since 2023, Murky Panda has targeted high-profile organizations in government, technology, academic, legal, and professional services across North America. The group exploits cloud-based software and service providers to spy on its intended targets. Murky Panda compromises exposed SOHO devices and deploys web shells to establish persistence. The group exploits CVE-2023-3519 in Citrix NetScaler ADC and NetScaler Gateway for unauthenticated remote code execution. Murky Panda gains access to SaaS providers' application registration secrets to authenticate as the app in customer cloud accounts. The group compromises a Microsoft cloud solution provider, gaining global administrator privileges over customers' Entra ID tenants. Murky Panda uses CloudedHope, a custom malware family written in Golang, for information stealing and anti-analysis measures. Murky Panda exploits the CVE-2025-0282 vulnerability in Ivanti Pulse Connect VPN. The group exploits zero-day vulnerabilities to break into a SaaS provider's cloud environment and access the provider's application registration secret in Entra ID. Murky Panda compromises a Microsoft cloud solution provider with delegated administrative privileges (DAP) to gain Global Administrator rights across all downstream tenants. The group uses compromised SOHO devices as proxy servers to blend malicious traffic with normal traffic and deploys web shells like Neo-reGeorg and China Chopper to establish persistence. Murky Panda modifies timestamps and deletes logs to hinder forensic analysis, demonstrating strong operational security (OPSEC).
Show sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage β thehackernews.com β 22.08.2025 14:06
- Silk Typhoon Attacks North American Orgs in the Cloud β www.darkreading.com β 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
Information Snippets
-
Murky Panda, also known as Silk Typhoon, targets government, technology, academic, legal, and professional services entities in North America.
First reported: 22.08.2025 14:06π° 3 sources, 3 articlesShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage β thehackernews.com β 22.08.2025 14:06
- Silk Typhoon Attacks North American Orgs in the Cloud β www.darkreading.com β 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Murky Panda exploits internet-facing appliances and SOHO devices to obtain initial access.
First reported: 22.08.2025 14:06π° 3 sources, 3 articlesShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage β thehackernews.com β 22.08.2025 14:06
- Silk Typhoon Attacks North American Orgs in the Cloud β www.darkreading.com β 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Murky Panda exploits vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway (CVE-2023-3519) and Commvault (CVE-2025-3928).
First reported: 22.08.2025 14:06π° 3 sources, 3 articlesShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage β thehackernews.com β 22.08.2025 14:06
- Silk Typhoon Attacks North American Orgs in the Cloud β www.darkreading.com β 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Murky Panda deploys web shells like neo-reGeorg and custom malware CloudedHope to establish persistence.
First reported: 22.08.2025 14:06π° 3 sources, 3 articlesShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage β thehackernews.com β 22.08.2025 14:06
- Silk Typhoon Attacks North American Orgs in the Cloud β www.darkreading.com β 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
CloudedHope is a 64-bit ELF binary written in Golang, functioning as a basic remote access tool (RAT) with anti-analysis and OPSEC measures.
First reported: 22.08.2025 14:06π° 3 sources, 3 articlesShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage β thehackernews.com β 22.08.2025 14:06
- Silk Typhoon Attacks North American Orgs in the Cloud β www.darkreading.com β 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Murky Panda abuses trusted cloud relationships to breach SaaS providers' cloud environments and conduct lateral movement.
First reported: 22.08.2025 14:06π° 3 sources, 3 articlesShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage β thehackernews.com β 22.08.2025 14:06
- Silk Typhoon Attacks North American Orgs in the Cloud β www.darkreading.com β 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Genesis Panda targets financial services, media, telecommunications, and technology sectors across 11 countries.
First reported: 22.08.2025 14:06π° 1 source, 1 articleShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage β thehackernews.com β 22.08.2025 14:06
-
Genesis Panda exploits cloud-hosted systems for lateral movement, persistence, and enumeration.
First reported: 22.08.2025 14:06π° 1 source, 1 articleShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage β thehackernews.com β 22.08.2025 14:06
-
Genesis Panda queries the Instance Metadata Service (IMDS) to obtain credentials and enumerate network configurations.
First reported: 22.08.2025 14:06π° 1 source, 1 articleShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage β thehackernews.com β 22.08.2025 14:06
-
Glacial Panda targets telecommunications organizations in 12 countries to exfiltrate call detail records and related communications telemetry.
First reported: 22.08.2025 14:06π° 1 source, 1 articleShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage β thehackernews.com β 22.08.2025 14:06
-
Glacial Panda targets Linux systems typical in the telecommunications industry, including legacy operating system distributions.
First reported: 22.08.2025 14:06π° 1 source, 1 articleShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage β thehackernews.com β 22.08.2025 14:06
-
Glacial Panda exploits known vulnerabilities and weak passwords aimed at internet-facing and unmanaged servers.
First reported: 22.08.2025 14:06π° 1 source, 1 articleShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage β thehackernews.com β 22.08.2025 14:06
-
Glacial Panda deploys trojanized OpenSSH components, codenamed ShieldSlide, to gather user authentication sessions and credentials.
First reported: 22.08.2025 14:06π° 1 source, 1 articleShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage β thehackernews.com β 22.08.2025 14:06
-
Silk Typhoon (Murky Panda) exploits cloud-based software and service providers to spy on high-profile organizations in North America.
First reported: 22.08.2025 23:52π° 2 sources, 2 articlesShow sources
- Silk Typhoon Attacks North American Orgs in the Cloud β www.darkreading.com β 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Silk Typhoon compromises exposed SOHO devices and deploys web shells to establish persistence.
First reported: 22.08.2025 23:52π° 2 sources, 2 articlesShow sources
- Silk Typhoon Attacks North American Orgs in the Cloud β www.darkreading.com β 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Silk Typhoon exploits CVE-2023-3519 in Citrix NetScaler ADC and NetScaler Gateway for unauthenticated remote code execution.
First reported: 22.08.2025 23:52π° 2 sources, 2 articlesShow sources
- Silk Typhoon Attacks North American Orgs in the Cloud β www.darkreading.com β 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Silk Typhoon gains access to SaaS providers' application registration secrets to authenticate as the app in customer cloud accounts.
First reported: 22.08.2025 23:52π° 2 sources, 2 articlesShow sources
- Silk Typhoon Attacks North American Orgs in the Cloud β www.darkreading.com β 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Silk Typhoon compromises a Microsoft cloud solution provider, gaining global administrator privileges over customers' Entra ID tenants.
First reported: 22.08.2025 23:52π° 2 sources, 2 articlesShow sources
- Silk Typhoon Attacks North American Orgs in the Cloud β www.darkreading.com β 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Silk Typhoon uses CloudedHope, a custom malware family written in Golang, for information stealing and anti-analysis measures.
First reported: 22.08.2025 23:52π° 2 sources, 2 articlesShow sources
- Silk Typhoon Attacks North American Orgs in the Cloud β www.darkreading.com β 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Murky Panda exploits the CVE-2025-0282 vulnerability in Ivanti Pulse Connect VPN.
First reported: 23.08.2025 00:56π° 1 source, 1 articleShow sources
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Murky Panda exploits zero-day vulnerabilities to break into a SaaS provider's cloud environment and access the provider's application registration secret in Entra ID.
First reported: 23.08.2025 00:56π° 1 source, 1 articleShow sources
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Murky Panda compromises a Microsoft cloud solution provider with delegated administrative privileges (DAP) to gain Global Administrator rights across all downstream tenants.
First reported: 23.08.2025 00:56π° 1 source, 1 articleShow sources
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Murky Panda uses compromised small office and home office (SOHO) devices as proxy servers to blend malicious traffic with normal traffic.
First reported: 23.08.2025 00:56π° 1 source, 1 articleShow sources
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Murky Panda deploys the Neo-reGeorg and China Chopper web shells to establish persistence on compromised servers.
First reported: 23.08.2025 00:56π° 1 source, 1 articleShow sources
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
-
Murky Panda modifies timestamps and deletes logs to hinder forensic analysis.
First reported: 23.08.2025 00:56π° 1 source, 1 articleShow sources
- Murky Panda hackers exploit cloud trust to hack downstream customers β www.bleepingcomputer.com β 23.08.2025 00:56
Similar Happenings
APT36 leverages Linux .desktop files for malware deployment in ongoing espionage campaign
APT36, a Pakistani threat actor also known as Transparent Tribe, is exploiting Linux .desktop files to install malware in attacks targeting government and defense entities in India. The campaign, active since August 1, 2025, aims at data exfiltration and maintaining persistent access. The attacks use phishing emails to deliver ZIP archives containing malicious .desktop files disguised as PDFs. The malware, a Go-based ELF executable, establishes persistence and communicates via a WebSocket channel for command and control. The campaign also targets Windows and BOSS Linux systems, using decoy PDFs and anti-debugging techniques to evade detection.
Shamos Infostealer Malware Targeting macOS Through ClickFix Attacks
A new infostealer malware, Shamos, is targeting macOS devices through ClickFix attacks. Developed by the COOKIE SPIDER group, Shamos steals data and credentials from browsers, Keychain, Apple Notes, and cryptocurrency wallets. The malware has attempted infections in over 300 monitored environments worldwide since June 2025. Victims are lured via malvertising or fake GitHub repositories that prompt them to execute malicious shell commands in the macOS Terminal. Once executed, Shamos performs anti-VM checks, host reconnaissance, and data collection. It then packages the stolen data into an archive and transmits it to the attackers. The malware can also download additional payloads and ensure persistence via a Plist file.
Threat Actors Exploit VPS Infrastructure for SaaS Account Compromises
Threat actors, including the China-linked APT41 group, are exploiting commercial virtual private server (VPS) infrastructure to quickly and stealthily set up attack infrastructure. This tactic has been observed in coordinated SaaS account compromises across multiple customer environments and in targeted cyber espionage campaigns against U.S. trade officials. The abuse of VPS services allows attackers to bypass geolocation-based defenses, evade IP reputation checks, and blend into legitimate behavior. The attacks involved brute-force attempts, anomalous logins, phishing campaign-related inbox rule creation, and impersonation tactics. In notable incidents, attackers successfully compromised accounts by exploiting VPS services from providers such as Hyonix, Host Universal, Mevspace, and Hivelocity. The attackers deleted phishing emails and created obfuscated email rules to conceal their activities. The use of VPS infrastructure enables attackers to rapidly deploy infrastructure, making it difficult for defenders to track and respond to threats. The impersonation of U.S. Rep. John Moolenaar was part of a larger espionage campaign targeting U.S. trade officials. The campaign involved spear-phishing attacks impersonating a U.S. Congressman to gain unauthorized access to systems and sensitive information. The attacks exploited developer tools to create hidden pathways and siphon data to attacker-controlled servers.
UNC5518 Access-as-a-Service Scheme Deploys CORNFLAKE.V3 Backdoor
UNC5518, a threat actor tracked by Mandiant, has been deploying the CORNFLAKE.V3 backdoor via the ClickFix social engineering tactic and fake CAPTCHA pages. This access-as-a-service scheme provides initial access to systems, which is then monetized by other threat groups, including UNC5774 and UNC4108. The backdoor supports multiple payload types and uses Cloudflare tunnels to evade detection. The attack chain begins with users interacting with compromised search results or malicious ads, leading them to fake CAPTCHA pages. Users are then tricked into executing a malicious PowerShell script, which downloads and executes CORNFLAKE.V3. The backdoor collects system information and can execute various payloads, including additional backdoors and credential-harvesting scripts. The CORNFLAKE.V3 backdoor is an updated version of CORNFLAKE.V2, featuring enhanced capabilities such as host persistence and support for additional payload types. The scheme has been observed since at least 2024, with multiple threat actors leveraging the initial access provided by UNC5518.
Multistage social engineering attacks targeting help desk teams
Threat actors are executing multistage, high-touch social engineering campaigns targeting help desk teams. These attacks exploit human instincts and familiarity to bypass traditional perimeter controls and gain network access. The primary goal is to manipulate help desk personnel into resetting passwords or overriding multifactor authentication (MFA) for privileged accounts. The FBI has issued alerts about groups like Scattered Spider, highlighting the increasing prevalence of these attacks. Organizations must rethink their help desk operations, including request validation processes and the culture that shapes real-time decisions. Training alone is insufficient; organizations need to implement robust protocols and foster a security-first culture.