Zephyrnet Logo

Tag: Chinese Hackers

White House cybersecurity strategy warns of ‘complex threat environment’

WASHINGTON — The White House on March 2 released a national cybersecurity strategy that points at Russian and Chinese hackers as major threats to...

TikTok Banned on Govt. Devices; Will Private Sector Follow Suit?

Texas this week become the fifth US state to ban the TikTok app on government-owned devices over concerns about the social media app harvesting...

Microsoft: Popular IoT SDKs Leave Critical Infrastructure Wide Open to Cyberattack

Microsoft this week identified a gaping attack vector for disabling industrial control systems (ICS), which is unfortunately pervasive throughout critical infrastructure networks: the Boa Web server.The computing giant has...

Symantec: Super-Stealthy ‘Daxin’ Backdoor Linked to Chinese Threat Actor

Threat hunters at Symantec are calling global attention to a new, highly sophisticated piece of malware being used by a Chinese threat actor to burrow into -- and hijack data from -- government and critical infrastructure targets.

read more

Chinese Hackers Target Taiwan’s Financial Trading Sector with Supply Chain Attack

An advanced persistent threat (APT) group operating with objectives aligned with the Chinese government has been linked to an organized supply chain attack on Taiwan's financial sector. The attacks are said to have first commenced at the end of November 2021, with the intrusions attributed to a threat actor tracked as APT10, also known as Stone Panda, the MenuPass group, and Bronze Riverside,

Ransomware-Related Data Leaks Nearly Doubled in 2021: Report

There was a significant increase in ransomware-related data leaks and interactive intrusions in 2021, according to the 2022 Global Threat Report released on Tuesday by endpoint security firm CrowdStrike.

read more

5 Data Security Strategies Businesses Should Implement

We have witnessed some horrifying data breaches over the last year. One of the worst was when a team of Chinese hackers penetrated the security of the Microsoft Exchange and accessed the accounts of over 250,000 global organizations. The Colonial Pipeline and SolarWinds were also victims to hackers. While large corporations like these will continue […]

The post 5 Data Security Strategies Businesses Should Implement appeared first on SmartData Collective.

Chinese Hackers Target Taiwanese Financial Institutions with a new Stealthy Backdoor

A Chinese advanced persistent threat (APT) group has been targeting Taiwanese financial institutions as part of a "persistent campaign" that lasted for at least 18 months. The intrusions, whose primary intent was espionage, resulted in the deployment of a backdoor called xPack, granting the adversary extensive control over compromised machines, Broadcom-owned Symantec said in a report published

Media Giant News Corp Targeted in China-Linked Cyberattack

Global multimedia giant News Corp on Friday revealed it fell victim to a targeted cyberattack that appears to have been conducted by a “foreign government.”

read more

Chinese Hackers Target Financial Institutions in Taiwan With Custom Backdoor

Between 2020 and 2021, a China-linked advanced persistent threat (APT) actor ran an espionage campaign targeting financial institutions in Taiwan, Symantec reports.

Tracked as Antlion, the hacking group is believed to have been active since at least 2011, and is likely backed by the Chinese government.

read more

Volexity Warns of ‘Active Exploitation’ of Zimbra Zero-Day

Malware hunters at Volexity are raising the alarm for a Chinese threat actor seen exploiting a zero-day flaw in the Zimbra email platform to infect media and government targets in Europe.

read more

Chinese Hackers Spotted Using New UEFI Firmware Implant in Targeted Attacks

A previously undocumented firmware implant deployed to maintain stealthy persistence as part of a targeted espionage campaign has been linked to the Chinese-speaking Winnti advanced persistent threat group (APT41). Kaspersky, which codenamed the rootkit MoonBounce, characterized the malware as the "most advanced UEFI firmware implant discovered in the wild to date," adding "the purpose of the

Latest Intelligence

spot_img
spot_img