🟡 CVE-2025-3800: A vulnerability has been found... 🟡 CVE-2025-3799: A vulnerability, which was cla... 🟡 CVE-2025-3798: A vulnerability, which was cla... 🟡 CVE-2025-3661: The SB Chart block plugin for ... ⚠️ CVE-2025-3404: The Download Manager plugin fo... 🔥 CVE-2021-4455: The Wordpress Plugin Smart Pro... 🟡 CVE-2025-3797: A vulnerability classified as ... ⚠️ CVE-2025-3809: The Debug Log Manager plugin f... ⚠️ CVE-2025-2111: The Insert Headers And Footers... ⚠️ CVE-2025-3103: The CLEVER - HTML5 Radio Playe... 🟡 CVE-2025-3275: The Themesflat Addons For Elem... 🟡 CVE-2025-1457: The Element Pack Addons for El... 🔥 CVE-2025-1093: The AIHub theme for WordPress ... 🟡 CVE-2025-3284: The User Registration & Member... 🔥 CVE-2025-3278: The UrbanGo Membership plugin ... ⚠️ CVE-2025-2010: The JobWP – Job Board, Job Lis... 🟡 CVE-2025-43903: NSSCryptoSignBackend.cc in Pop... 🟡 CVE-2025-3796: A vulnerability classified as ... ⚠️ CVE-2025-32953: z80pack is a mature emulator o... 🟡 CVE-2025-3795: A vulnerability was found in D... 🟡 CVE-2025-36625: In Nessus versions prior to 10... 🟡 CVE-2025-32377: Rasa Pro is a framework for bu... 🟢 CVE-2025-25985: An issue in Macro-video Techno... 🟡 CVE-2025-25984: An issue in Macro-video Techno... 🟢 CVE-2025-25983: An issue in Macro-video Techno... 🟡 CVE-2025-28355: Volmarg Personal Management Sy... ⚠️ CVE-2025-24914: When installing Nessus to a no... 🟡 CVE-2025-29513: Cross-Site Scripting (XSS) vul... 🟡 CVE-2025-29512: Cross-Site Scripting (XSS) vul... 🟡 CVE-2025-1697: A potential security vulnerabi... 🟡 CVE-2024-41447: A stored cross-site scripting ... 🟡 CVE-2025-32796: Dify is an open-source LLM app... 🟡 CVE-2025-32795: Dify is an open-source LLM app... ⚠️ CVE-2025-32792: SES safely executes third-part... ⚠️ CVE-2025-32442: Fastify is a fast and low over... 🔥 CVE-2025-32434: PyTorch is a Python package th... ⚠️ CVE-2025-32389: NamelessMC is a free, easy to ... 🟡 CVE-2025-31120: NamelessMC is a free, easy to ... ⚠️ CVE-2025-31118: NamelessMC is a free, easy to ... ⚠️ CVE-2025-30357: NamelessMC is a free, easy to ... ⚠️ CVE-2025-30158: NamelessMC is a free, easy to ... ⚠️ CVE-2025-29784: NamelessMC is a free, easy to ... 🟡 CVE-2025-27599: Element X Android is a Matrix ... 🟡 CVE-2025-3792: A vulnerability, which was cla... 🟡 CVE-2025-3791: A vulnerability classified as ... 🟡 CVE-2025-2950: IBM i 7.3, 7.4, 7.5, and 7.5 i... ⚠️ CVE-2025-29625: A buffer overflow vulnerabilit... 🟡 CVE-2025-3790: A vulnerability classified as ... 🟡 CVE-2025-3789: A vulnerability was found in b... 🟡 CVE-2025-32790: Dify is an open-source LLM app... 🟡 CVE-2024-46089: 74cms <=3.33 is vulnerable to ... 🟡 CVE-2024-49808: IBM Sterling Connect:Direct We... 🟡 CVE-2024-45651: IBM Sterling Connect:Direct We... 🟡 CVE-2025-3788: A vulnerability was found in b... 🟡 CVE-2025-3787: A vulnerability was found in P... 🟡 CVE-2025-3106: The LA-Studio Element Kit for ... ⚠️ CVE-2025-3786: A vulnerability was found in T... ⚠️ CVE-2025-3785: A vulnerability has been found... 🟡 CVE-2025-3056: The Download Manager plugin fo... 🔥 CVE-2025-2492: An improper authentication con... 🟡 CVE-2025-3783: A vulnerability classified as ... 🟡 CVE-2025-3598: The Coupon Affiliates – Affili... 🟡 CVE-2025-2162: The MapPress Maps for WordPres... 🔥 CVE-2025-1863: Insecure default settings have... 🔥 CVE-2025-39471: Improper Neutralization of Spe... ⚠️ CVE-2025-39470: Path Traversal: '.../...//' vu... ⚠️ CVE-2025-39469: Improper Neutralization of Inp... 🔥 CVE-2025-42599: Active! mail 6 BuildInfo: 6.60... ⚠️ CVE-2025-3520: The Avatar plugin for WordPres... 🟡 CVE-2025-2613: The Login Manager – Design Log... 🟡 CVE-2024-13650: The Piotnet Addons For Element... ⚠️ CVE-2025-25427: A Stored cross-site scripting ... ⚠️ CVE-2025-3509: A Remote Code Execution (RCE) ... ⚠️ CVE-2025-3246: An improper neutralization of ... 🟡 CVE-2025-3124: A missing authorization vulner... 🟢 CVE-2024-42178: HCL MyXalytics is affected by ... 🟡 CVE-2025-3765: A vulnerability, which was cla... 🟡 CVE-2025-3764: A vulnerability classified as ... 🟢 CVE-2024-42177: HCL MyXalytics is affected by ... 🟡 CVE-2025-3763: A vulnerability classified as ... 🟡 CVE-2025-3762: A vulnerability was found in P... 🟡 CVE-2025-29722: A CSRF vulnerability in Commer... 🟡 CVE-2025-28101: An arbitrary file deletion vul... 🔥 CVE-2025-28009: A SQL Injection vulnerability ... 🟢 CVE-2025-26269: DragonflyDB Dragonfly through ... 🟢 CVE-2025-26268: DragonflyDB Dragonfly before 1... ⚠️ CVE-2024-55211: An issue in Think Router Tk-Rt... 🟢 CVE-2021-47671: In the Linux kernel, the follo... ⚠️ CVE-2021-47670: In the Linux kernel, the follo... ⚠️ CVE-2021-47669: In the Linux kernel, the follo... ⚠️ CVE-2021-47668: In the Linux kernel, the follo... 🟢 CVE-2025-32415: In libxml2 before 2.13.8 and 2... ⚠️ CVE-2025-2947: IBM i 7.6  contains a privile... ⚠️ CVE-2025-29661: Litepubl CMS <= 7.0.9 is vulne... ⚠️ CVE-2025-29181: FOXCMS <= V1.25 is vulnerable ... ⚠️ CVE-2025-29180: In FOXCMS <=1.25, the installd... ⚠️ CVE-2025-29039: An issue in dlink DIR 832x 240... ⚠️ CVE-2025-43015: In JetBrains RubyMine before 2... 🟡 CVE-2025-43014: In JetBrains Toolbox App befor... 🟡 CVE-2025-43013: In JetBrains Toolbox App befor...
US Sanctions Chinese Firm Linked to Flax Typhoon Cyberattacks

US Sanctions Chinese Firm Linked to Flax Typhoon Cyberattacks

In a decisive move to counter cyber threats, the United States has imposed sanctions on Beijing-based cybersecurity company Integrity Technology Group, also known as Yongxin Zhicheng Technology Group. The firm is accused of supporting the state-sponsored hacking group "Flax Typhoon" in conducting cyberattacks against U.S. critical infrastructure.

Background on Flax Typhoon

Active since at least 2021, Flax Typhoon has targeted organizations across various sectors, including government agencies, telecommunications providers, and media organizations. The group exploits known vulnerabilities to gain initial access and utilizes legitimate remote access tools to maintain persistent, long-term access within compromised networks. Their operations have extended beyond the United States, affecting entities in North America, Europe, Africa, and Asia, with a particular focus on Taiwan.

Details of the Sanctions

On January 3, 2025, the U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) announced sanctions against Integrity Technology Group. These measures block the company's access to U.S. property and financial systems, effectively prohibiting American individuals and entities from conducting business with the firm. The sanctions aim to disrupt the support network enabling Flax Typhoon's cyber activities.

Evidence Linking Integrity Technology Group

According to U.S. authorities, between summer 2022 and fall 2023, Flax Typhoon utilized infrastructure tied to Integrity Technology Group to conduct cyber intrusions. The group routinely exchanged information through the company's systems, facilitating unauthorized access to multiple U.S. and European entities. Notably, in the summer of 2023, Flax Typhoon compromised several servers and workstations at a California-based organization.

Disruption of Flax Typhoon's Botnet

In September 2024, the Federal Bureau of Investigation (FBI) and partner agencies dismantled a massive botnet operated by Flax Typhoon. This botnet comprised over 260,000 compromised devices, including routers, network-attached storage devices, and IP cameras. Integrity Technology Group was identified as controlling and managing the botnet since mid-2021, using it to route malicious traffic, launch distributed denial-of-service (DDoS) attacks, and deliver other malware.

China's Response

The Chinese government has criticized the U.S. sanctions, labeling them as baseless and defamatory. China's Foreign Ministry spokesperson stated that the country has consistently cracked down on cyberattacks and accused the U.S. of using the issue to "defame and smear China." Integrity Technology Group also denied the allegations, asserting that the sanctions lack factual basis and will not impact their business operations, as they do not operate within the United States.

Implications and Future Outlook

This action underscores the United States' commitment to combating cyber threats and holding malicious cyber actors accountable. By targeting entities that provide support to hacking groups like Flax Typhoon, the U.S. aims to disrupt the infrastructure enabling such operations. The sanctions serve as a warning to other organizations that may be complicit in cyber espionage activities, emphasizing the potential consequences of facilitating state-sponsored hacking campaigns.

Conclusion

The imposition of sanctions on Integrity Technology Group represents a significant step in the ongoing efforts to safeguard U.S. critical infrastructure from cyber threats. As cyber espionage tactics continue to evolve, coordinated actions and international cooperation remain essential in addressing the challenges posed by state-sponsored hacking groups.

Sources

Back to Posts