Murky Panda, Genesis Panda, Glacial Panda Cloud and Telecom Intrusions
Summary
Hide ▲
Show ▼
Chinese hacking groups Murky Panda, Genesis Panda, and Glacial Panda have escalated their cloud and telecom espionage activities. Murky Panda, also known as Silk Typhoon, exploits trusted cloud relationships and zero-day vulnerabilities to breach enterprise networks. They target government, technology, academic, legal, and professional services entities in North America. Murky Panda exploits internet-facing appliances and known security flaws in Citrix, Commvault, and Ivanti Pulse Connect VPN to deploy web shells and custom malware. They compromise exposed SOHO devices and deploy web shells to establish persistence. In recent attacks, Murky Panda exploited zero-day vulnerabilities to break into a SaaS provider's cloud environment and gain access to the provider's application registration secret in Entra ID. They also compromised a Microsoft cloud solution provider with delegated administrative privileges (DAP) to gain Global Administrator rights across all downstream tenants. Genesis Panda, active since January 2024, targets financial, media, telecommunications, and technology sectors across 11 countries. They leverage cloud services for exfiltration and persistence. Glacial Panda targets telecoms in 12 countries, exploiting Linux systems and legacy technologies. They use privilege escalation bugs and trojanized OpenSSH components for backdoor access.
Timeline
-
22.08.2025 14:06 3 articles · 1mo ago
Murky Panda Exploits Cloud Relationships for Espionage
Murky Panda exploits internet-exposed devices and services, such as CVE-2023-3519 in Citrix NetScaler devices, ProxyLogin in Microsoft Exchange, and CVE-2025-0282 in Ivanti Pulse Connect VPN. They exploit zero-day vulnerabilities to break into a SaaS provider's cloud environment and gain access to the provider's application registration secret in Entra ID. They compromise a Microsoft cloud solution provider with delegated administrative privileges (DAP) to gain Global Administrator rights across all downstream tenants. They use Neo-reGeorg and China Chopper web shells to establish persistence on compromised servers. They demonstrate strong operational security (OPSEC), including modifying timestamps and deleting logs to hinder forensic analysis. They use compromised SOHO devices as proxy servers to blend in with normal traffic and evade detection.
Show sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage — thehackernews.com — 22.08.2025 14:06
- Silk Typhoon Attacks North American Orgs in the Cloud — www.darkreading.com — 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
Information Snippets
-
Murky Panda exploits trusted cloud relationships and zero-day vulnerabilities to breach enterprise networks.
First reported: 22.08.2025 14:063 sources, 3 articlesShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage — thehackernews.com — 22.08.2025 14:06
- Silk Typhoon Attacks North American Orgs in the Cloud — www.darkreading.com — 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
-
Murky Panda deploys web shells like neo-reGeorg and custom malware CloudedHope to establish persistence.
First reported: 22.08.2025 14:063 sources, 3 articlesShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage — thehackernews.com — 22.08.2025 14:06
- Silk Typhoon Attacks North American Orgs in the Cloud — www.darkreading.com — 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
-
CloudedHope is a 64-bit ELF binary written in Golang, functioning as a basic remote access tool (RAT).
First reported: 22.08.2025 14:063 sources, 3 articlesShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage — thehackernews.com — 22.08.2025 14:06
- Silk Typhoon Attacks North American Orgs in the Cloud — www.darkreading.com — 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
-
Murky Panda exploits known security flaws in Citrix NetScaler ADC and NetScaler Gateway (CVE-2023-3519) and Commvault (CVE-2025-3928).
First reported: 22.08.2025 14:063 sources, 3 articlesShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage — thehackernews.com — 22.08.2025 14:06
- Silk Typhoon Attacks North American Orgs in the Cloud — www.darkreading.com — 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
-
Genesis Panda targets cloud services for lateral movement, persistence, and enumeration.
First reported: 22.08.2025 14:061 source, 1 articleShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage — thehackernews.com — 22.08.2025 14:06
-
Genesis Panda queries the Instance Metadata Service (IMDS) to obtain credentials for the cloud control plane.
First reported: 22.08.2025 14:061 source, 1 articleShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage — thehackernews.com — 22.08.2025 14:06
-
Glacial Panda targets telecoms for intelligence collection, exploiting Linux systems and legacy technologies.
First reported: 22.08.2025 14:061 source, 1 articleShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage — thehackernews.com — 22.08.2025 14:06
-
Glacial Panda uses privilege escalation bugs like CVE-2016-5195 (Dirty COW) and CVE-2021-4034 (PwnKit).
First reported: 22.08.2025 14:061 source, 1 articleShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage — thehackernews.com — 22.08.2025 14:06
-
Glacial Panda deploys trojanized OpenSSH components, codenamed ShieldSlide, for backdoor access.
First reported: 22.08.2025 14:061 source, 1 articleShow sources
- Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage — thehackernews.com — 22.08.2025 14:06
-
Silk Typhoon (Murky Panda) exploits cloud trust relationships to spy on high-profile organizations in North America.
First reported: 22.08.2025 23:522 sources, 2 articlesShow sources
- Silk Typhoon Attacks North American Orgs in the Cloud — www.darkreading.com — 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
-
Silk Typhoon compromises exposed SOHO devices and deploys web shells to establish persistence.
First reported: 22.08.2025 23:522 sources, 2 articlesShow sources
- Silk Typhoon Attacks North American Orgs in the Cloud — www.darkreading.com — 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
-
Silk Typhoon exploits zero-day vulnerabilities in cloud environments to gain access to downstream customers.
First reported: 22.08.2025 23:522 sources, 2 articlesShow sources
- Silk Typhoon Attacks North American Orgs in the Cloud — www.darkreading.com — 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
-
Silk Typhoon compromises trusted Microsoft cloud solution providers to gain global administrator privileges.
First reported: 22.08.2025 23:522 sources, 2 articlesShow sources
- Silk Typhoon Attacks North American Orgs in the Cloud — www.darkreading.com — 22.08.2025 23:52
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
-
CloudedHope is a custom malware family written in Golang, functioning as a remote access Trojan (RAT).
First reported: 22.08.2025 23:521 source, 1 articleShow sources
- Silk Typhoon Attacks North American Orgs in the Cloud — www.darkreading.com — 22.08.2025 23:52
-
Murky Panda exploits zero-day vulnerabilities in cloud environments to gain access to downstream customers.
First reported: 23.08.2025 00:561 source, 1 articleShow sources
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
-
Murky Panda compromises trusted Microsoft cloud solution providers to gain global administrator privileges.
First reported: 23.08.2025 00:561 source, 1 articleShow sources
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
-
Murky Panda exploits internet-exposed devices and services, such as CVE-2023-3519 in Citrix NetScaler devices, ProxyLogin in Microsoft Exchange, and CVE-2025-0282 in Ivanti Pulse Connect VPN.
First reported: 23.08.2025 00:561 source, 1 articleShow sources
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
-
Murky Panda exploits zero-day vulnerabilities to break into a SaaS provider's cloud environment and gain access to the provider's application registration secret in Entra ID.
First reported: 23.08.2025 00:561 source, 1 articleShow sources
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
-
Murky Panda compromises a Microsoft cloud solution provider with delegated administrative privileges (DAP) to gain Global Administrator rights across all downstream tenants.
First reported: 23.08.2025 00:561 source, 1 articleShow sources
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
-
Murky Panda uses Neo-reGeorg and China Chopper web shells to establish persistence on compromised servers.
First reported: 23.08.2025 00:561 source, 1 articleShow sources
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
-
Murky Panda demonstrates strong operational security (OPSEC), including modifying timestamps and deleting logs to hinder forensic analysis.
First reported: 23.08.2025 00:561 source, 1 articleShow sources
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
-
Murky Panda uses compromised small office and home office (SOHO) devices as proxy servers to blend in with normal traffic and evade detection.
First reported: 23.08.2025 00:561 source, 1 articleShow sources
- Murky Panda hackers exploit cloud trust to hack downstream customers — www.bleepingcomputer.com — 23.08.2025 00:56
Similar Happenings
APT41 targets U.S. trade officials with phishing campaigns amid negotiations
APT41, a China-linked threat group, has been conducting targeted phishing campaigns against U.S. trade officials, law firms, think tanks, and academic organizations. The attacks, impersonating U.S. officials and organizations, aim to steal sensitive data related to U.S.-China trade negotiations. The campaigns have been ongoing since at least January 2025, with a surge in activity observed in July and August 2025. The U.S. House Select Committee on China has issued a formal advisory warning about these activities, linking them to a Beijing-led effort to influence policy deliberations. The FBI is investigating these attacks. The phishing emails impersonate U.S. officials, including Rep. John Robert Moolenaar, and organizations such as the U.S.-China Business Council, to trick recipients into opening malicious attachments or links. The attacks exploit software and cloud services to evade detection and exfiltrate data. The goal is to gain an advantage in trade and foreign policy negotiations. The Chinese embassy has denied the allegations, stating that China opposes cyber attacks and cyber crime. APT41 has been linked to various sophisticated campaigns targeting multiple sectors, including logistics, utility companies, healthcare, high-tech, and telecommunications.
Chinese State-Sponsored Actors Target Global Critical Infrastructure
Chinese state-sponsored Advanced Persistent Threat (APT) actors, specifically the Salt Typhoon group and a newly identified group named RedNovember, have been conducting sustained campaigns to compromise critical infrastructure networks worldwide. The campaigns aim to gain long-term access to telecommunications, government, transportation, lodging, and military networks. This activity has been detailed in a joint advisory by CISA, NSA, FBI, and international partners, including Canada, Australia, New Zealand, the UK, Czech Republic, Finland, Germany, Italy, Japan, the Netherlands, Poland, and Spain. The advisory provides intelligence on tactics used by these actors and recommends mitigations to strengthen defenses. The Czech Republic's National Cyber and Information Security Agency (NUKIB) has issued a warning instructing critical infrastructure organizations to avoid using Chinese technology or transferring user data to servers located in China. The agency has re-evaluated its risk estimate of significant disruptions caused by China, now assessing it at a 'High' level. The NUKIB has confirmed malicious activities of Chinese cyber-actors targeting the Czech Republic, including a recent APT31 campaign targeting the Czech Ministry of Foreign Affairs. The advisory highlights concerns over the transfer of system and user data to China, potentially misused by state, military, or political interests. The Czech government previously accused China of targeting its critical infrastructure through APT 31, an allegation denied by the PRC but condemned by the US, EU, and NATO. The advisory suggests that individuals and organizations consider restricting or prohibiting the use of products and services that transfer data to China. The campaign has targeted at least 600 organizations across 80 countries, including 200 in the U.S. The threat actors have exploited vulnerabilities in Cisco, Ivanti, and Palo Alto Networks devices to gain initial access and have modified routers to maintain persistent access and pivot into other networks. The advisory also notes that the APT actors may target other devices such as Fortinet firewalls, Juniper firewalls, Microsoft Exchange, Nokia routers and switches, Sierra Wireless devices, Sonicwall firewalls, etc. RedNovember has targeted perimeter appliances of high-profile organizations globally, including defense and aerospace organizations, space organizations, and law firms. The group has breached at least two U.S. defense contractors, a European engine manufacturer, and a trade-focused intergovernmental cooperation body in Southeast Asia. RedNovember has used the Go-based backdoor Pantegana and Cobalt Strike as part of its intrusions, along with the Spark RAT and LESLIELOADER. The group has also used VPN services like ExpressVPN and Warp VPN to administer and connect to servers used for exploitation and communication.
Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data
The threat actor, tracked as UNC6395 by Google and GRUB1 by Cloudflare, exploited OAuth tokens associated with the Drift AI chat agent to breach Salesloft and steal data from Salesforce customer instances. The campaign, active from August 8 to at least August 18, 2025, targeted over 700 organizations, including Workiva and Stellantis, and impacted all integrations connected to the Drift platform, not just Salesforce. The attackers exported large volumes of data, including credentials for AWS, passwords, and Snowflake access tokens. Zscaler, Palo Alto Networks, Cloudflare, and Workiva reported data breaches after threat actors accessed their Salesforce instances via compromised Salesloft Drift credentials, exposing customer information. The breach began with the compromise of Salesloft's GitHub account, accessed by UNC6395 from March to June 2025. The threat actor accessed multiple repositories, added a guest user, and established workflows. Reconnaissance activities occurred in the Salesloft and Drift application environments between March and June 2025. The attackers accessed Drift's AWS environment and obtained OAuth tokens for Drift customers' technology integrations. Salesloft isolated the Drift infrastructure, application, and code, and took the application offline on September 5, 2025. Salesloft rotated credentials in the Salesloft environment and hardened it with improved segmentation controls. Salesloft recommends that all third-party applications integrated with Drift via API key revoke the existing key. Salesforce restored the integration with the Salesloft platform on September 7, 2025, except for the Drift app, which remains disabled. Salesloft and Salesforce have taken steps to mitigate the breach, including revoking tokens and removing the Drift application from AppExchange. The breach highlights the risks associated with third-party integrations and the potential for supply chain attacks. UNC6395 demonstrated operational discipline, querying and exporting data methodically, and attempting to cover their tracks by deleting query jobs. The targeted organizations included security and technology companies, suggesting a broader strategy to infiltrate vendors and service providers. The campaign is limited to Salesloft customers who integrate their own solutions with the Salesforce service. There is no evidence that the breaches directly impacted Google Cloud customers, though any of them that use Salesloft Drift should review their Salesforce objects for any Google Cloud Platform service account keys. The threat group ShinyHunters and Scattered Spider claimed responsibility for many of those attacks, and vishing attacks have been cited as the means of compromise. Google disclosed that UNC6040 breached one of its Salesforce instances using these tactics. The UNC6395 Salesloft Drift activity is separate from the vishing attacks attributed to UNC6040. Okta successfully defended against a potential breach by enforcing inbound IP restrictions, securing tokens with DPoP, and using the IPSIE framework. Okta recommends that organizations demand IPSIE integration from application vendors and implement an identity security fabric. Palo Alto Networks' Unit 42 advised organizations to conduct immediate log reviews for signs of compromise and rotate exposed credentials. Okta suggests reducing the blast radius of a single entity breach by constraining token use by IP and client and ensuring granular permissions for M2M integrations. The FBI has issued a FLASH alert warning that two threat clusters, tracked as UNC6040 and UNC6395, are compromising organizations' Salesforce environments to steal data and extort victims. UNC6040 is a threat actor that specializes in voice phishing or vishing and recently was observed using social engineering to pose as IT support staff to get into Salesforce environments. UNC6395 is best known for using stolen OAuth tokens from Salesloft's Drift application, which has a Salesforce integration, to steal sensitive data from hundreds of Salesforce environments earlier this year. The FBI's latest advisory provides additional context into the technical aspects of the threat campaigns, particularly UNC6040's activity, which began last fall. The advisory also includes indicators of compromise, including IP addresses and URLs associated with the two campaigns.
UNC6384 Targets Diplomats with PlugX via Captive Portal Hijacks
UNC6384, a China-nexus threat actor, has been targeting diplomats in Southeast Asia and other entities globally to advance Beijing's strategic interests. The group employs a multi-stage attack chain leveraging advanced social engineering, valid code signing certificates, adversary-in-the-middle (AitM) attacks, and indirect execution techniques to evade detection. The campaign, detected in March 2025, uses captive portal redirections to deliver a PlugX variant called SOGU.SEC. The attacks involve redirecting web traffic through a captive portal to a threat actor-controlled website, downloading a digitally signed downloader (STATICPLUGIN), and deploying the SOGU.SEC backdoor in memory. The malware supports commands to exfiltrate files, log keystrokes, and launch remote command shells. The campaign highlights the sophistication of PRC-nexus threat actors and their evolving operational capabilities. The campaign targeted around two dozen victims, primarily Southeast Asian diplomats, between March and July 2025. The attack chain involved compromised edge devices intercepting captive portal checks and redirecting users to a malicious website. The malicious website used a valid TLS/SSL certificate issued by Let's Encrypt to avoid browser security warnings. The first-stage malware, STATICPLUGIN, dropped a launcher called CANONSTAGER, which used unconventional techniques to hide its activities. The final payload was a variant of the PlugX backdoor, tracked by Google as SOGU.SEC. In September 2025, new information revealed that the PlugX variant overlaps with RainyDay and Turian backdoors, targeting telecommunications and manufacturing sectors in Central and South Asia. The campaign is linked to Mustang Panda, which also uses Bookworm malware. Bookworm has been used since 2015 and includes capabilities to execute commands, upload/download files, exfiltrate data, and establish persistent access.
Russian Hackers Exploit Old Cisco Vulnerability to Target U.S. Critical Infrastructure
Russian hackers, tracked as Static Tundra and associated with the FSB's Center 16 or Military Unit 71330, have been exploiting a seven-year-old vulnerability (CVE-2018-0171) in unpatched end-of-life Cisco networking devices to target enterprise and critical infrastructure networks in the U.S. and abroad. The attacks, ongoing since at least August 2024, have compromised thousands of devices, allowing the attackers to collect configuration files, change settings, and gain unauthorized access. The U.S. Department of State is offering a reward of up to $10 million for information on three FSB officers involved in these cyberattacks. The targets include organizations in the manufacturing, telecommunications, higher education, and energy sectors. The attackers use stolen SNMP credentials to control compromised devices, enabling them to run commands, change settings, and steal configurations while evading detection. They also create new local user accounts and enable remote access services like Telnet to maintain access. The attacks highlight the persistent threat of unpatched vulnerabilities and the need for robust cybersecurity measures to protect critical infrastructure. The three FSB officers, Marat Valeryevich Tyukov, Mikhail Mikhailovich Gavrilov, and Pavel Aleksandrovich Akulov, targeted more than 380 foreign energy-sector companies in 135 countries. The suspects targeted American and foreign oil and gas firms, nuclear power plants, renewable energy firms, utility and electrical grid entities, consulting and engineering groups, and advanced technology companies. In August 2021, these officers were indicted in the US with charges of computer fraud and abuse, wire fraud, and aggravated identity theft. The Dragonfly campaign involved obtaining persistent access to victim networks and infecting them with the Havex malware through supply chain compromise. In the second phase, known as Dragonfly 2.0, the three allegedly targeted over 3,300 users at more than 500 US and international companies and entities, including US government agencies, in spear-phishing attacks.