BeyondTrust, a leading identity and access management firm, disclosed a critical security breach impacting 17 customers of its Remote Support SaaS platform.
The breach was attributed to the exploitation of zero-day vulnerabilities and has since been linked to the China-based hacking group Silk Typhoon.
While U.S. federal agencies and law enforcement continue their investigations, BeyondTrust has taken measures to fix the issue.
The breach was discovered after BeyondTrust saw unusual activity in their Remote Support SaaS system. A root cause analysis revealed that an infrastructure API key had been compromised by a zero-day vulnerability in a third-party application.
This allowed attackers to reset local application passwords and gain unauthorized access to certain Remote Support SaaS instances.
The attackers exploited a critical zero-day vulnerability in a third-party application to access an online asset in BeyondTrust’s AWS account.
This access enabled them to obtain an infrastructure API key, which was then used against another AWS account operating the Remote Support infrastructure.
The two vulnerabilities identified during the investigation are:
Both vulnerabilities were actively exploited in the wild, prompting BeyondTrust to issue patches for all cloud-based instances while urging self-hosted customers to apply updates manually.
The attack has been attributed to Silk Typhoon (formerly Hafnium), a China-linked cyber-espionage group known for targeting government entities and critical infrastructure.
The group reportedly accessed unclassified data from the U.S. Treasury Department using the stolen API key.
“No BeyondTrust products outside of Remote Support SaaS were affected. No FedRAMP instances were affected. No other BeyondTrust systems were compromised, and ransomware was not involved”, the company said.
BeyondTrust implemented several immediate actions following the breach:
Additionally, BeyondTrust applied patches for discovered vulnerabilities across all SaaS instances and continues to support affected customers by providing logs, indicators of compromise (IOCs), and other forensic artifacts.
This breach underscores the growing risks associated with non-human identities, such as API keys, when combined with software vulnerabilities. Organizations are urged to adopt robust security practices to safeguard against similar exploits.
Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Start Now for Free.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned organizations worldwide about active exploitation…
A sophisticated malware campaign targeting WordPress sites has emerged, utilizing PHP variable functions and cookie-based…
An international ecosystem of sophisticated scam operations has emerged, targeting vulnerable populations through impersonation tactics…
TransparentTribe, a Pakistani-nexus intrusion set active since at least 2013, has intensified its cyber espionage…
As the festive season approaches, organizations are witnessing a disturbing increase in targeted attacks on…
The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with…