Chinese state-sponsored hacking group Salt Typhoon has launched a new wave of cyberattacks targeting U.S. telecommunications providers by exploiting vulnerabilities in unpatched Cisco IOS XE network devices. These breaches, affecting major firms such as AT&T, Verizon, and T-Mobile, have raise...
The APT41 group is one of today's most infamous and most active state-sponsored hacking groups. ATP41's operations were first detailed in their full breadth in aFireEye reportpublished in August 2019, with the report linking the group to some of the biggest supply-chain attacks in recent yea...
A Chinese hacking group that is likely state-sponsored and has been linked previously to attacks on U.S. state government computers is still "highly active" and is focusing on a broad range of targets that may be of strategic ...
Microsoft uses the codename Typhoon to refer to Chinese state-sponsored hacking groups.The two other such groups Microsoft has publicly disclosed are Volt Typhoon, which has been tied to attack targeting critical infrastructure for likely prepositioning to disrupt such infrastructure in the event of a...
The increased targeting of edge network devices also coincides with a threat assessment from the Canadian Centre for Cyber Security (Cyber Centre) that revealed at least 20 Canadian government networks have been compromised by Chinese state-sponsored hacking crews over the past four years to advance ...
report ties those multiple hacking campaigns—with varying levels of confidence—to chinese state-sponsored hacking groups including those known as apt41, apt31, and volt typhoon, the latter of which is a particularly aggressive team that has sought the ability to disrupt critical infrastructure in ...
In fact, it is very common for state-sponsored hacking groups to target airline companies, hotel chains, and telcos to obtain data they could use to track the movements and communications of persons of interest. Past examples include Chinese group APT41, which targeted telcos with special ...
The Insikt Group, the threat research division of Massachusetts-based Recorded Future, said the hacking group, given the temporary name TAG-28, made use of Winnti malware, which it said is exclusively shared among several Chinese state-sponsored activity groups. ...
Links to Chinese APT Groups Although the organization’s name is still unknown, Symantec believes that the group behind the attack is closely linked to the Chinese state-sponsored groupDaggerfly(Daggerfly (also known as BRONZE HIGHLAND StormCloud, and Evasive Panda) and Crimson Palace. ...
Amid heightenedborder tensionsbetween India and China, cybersecurity researchers have revealed a concerted campaign against India's critical infrastructure, including the nation's power grid, from Chinese state-sponsored groups. The attacks, which coincided with the standoff between the two nations in ...