Sunday, February 28, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

Chinese hackers use phishing emails to target engineering, transport and defence companies

March 4, 2019
in Internet Security
Google announces Kubernetes Operator for Apache Spark
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

High profile organisations in engineering, transportation and defence industries particularly with links to the maritime sector, are being targeted by a state-backed Chinese hacking operation, according to security company researchers.

The cyber espionage campaign has been detailed by security company FireEye, which has labelled the group Advanced Persistent Threat (APT) 40 – or more colloquially, Periscope.

You might also like

Cybercrime groups are selling their hacking skills. Some countries are buying

Why would you ever trust Amazon’s Alexa after this?

Microsoft: We’ve open-sourced this tool we used to hunt for code by SolarWinds hackers

The group has been active since at least January 2013. The main targets seem to be US companies in engineering, transport and defence – although it has targeted other organisations around the world. The group has also targeted university research departments focused on maritime issues, something researchers believe to be linked to China’s desire to build up its navy.

The group has also targeted businesses operating in the South China Sea – a strategically important region and the focus of disputes between China and other states.

The way the group selects its targets plus other factors have led FireEye to state with “high confidence” that the APT40 activity is  a state-backed cyber espionage group. The times of day the group is active also suggests that it’s based near Beijing and the group has reportedly used malware which has been observed in other Chinese operations, indicating some level of collaboration.

SEE: Cyberwar predictions for 2019: The stakes have been raised

The researchers also note that the targeting of maritime, engineering and transportation industries tie in with China’s ‘Belt and Road Initiative’ which aims to develop Chinese infrastructure in countries around the world.

Countries including Cambodia, Belgium, Germany, Hong Kong, Philippines, Malaysia, Norway, Saudi Arabia, Switzerland, the US, and the UK, have all been targeted in attacks, warn researchers.

Periscope’s activity has previously been suspected of being linked to China, but now FireEye has built up a case which they believe almost certainly links the operation to the Chinese state.

APT40 is described a “moderately sophisticated cyber espionage group” which combines access to “significant” development resources with the ability to leverage publicly available tools which have become a staple for some hacking groups, as they can make it easier to hide hacking activity.

Like many espionage campaigns, much of APT40’s activity begins by attempting to trick targets with phishing emails, before deploying malware such as the Gh0st RAT trojan to maintain persistence on a compromised network.

The group has also uses website and web server compromise as a means of attack and is able to leverage what’s described as an “enormous” library of tools as part of campaigns, including exploits taking advantage of known CVE software vulnerabilities.

Once inside a network, APT40 uses credential harvesting tools to gain usernames and passwords, allowing it to expand its reach across the network and move laterally through an environment as it moves to towards the ultimate goal of stealing data.

Despite the main goal of the campaign being espionage, researchers note that that APT40 remains active despite increasing attention being placed upon its activities and that the group will continue to be so for some time to come.

The report on APT40 concludes with a warning: the group will look to extend its activity into additional sectors which are seen to be important for the Belt and Road initiative, so this is unlikely to be the last they are heard from.

READ MORE ON CYBER CRIME

Credit: Source link

Previous Post

Researchers Link 'Sharpshooter' Cyber Attacks to North Korean Hackers

Next Post

How to Use Storytelling in Marketing: Neuroscience Insights

Related Posts

Cybercrime groups are selling their hacking skills. Some countries are buying
Internet Security

Cybercrime groups are selling their hacking skills. Some countries are buying

February 28, 2021
Why would you ever trust Amazon’s Alexa after this?
Internet Security

Why would you ever trust Amazon’s Alexa after this?

February 28, 2021
Microsoft: We’ve open-sourced this tool we used to hunt for code by SolarWinds hackers
Internet Security

Microsoft: We’ve open-sourced this tool we used to hunt for code by SolarWinds hackers

February 27, 2021
Oxford University lab with COVID-19 research links targeted by hackers
Internet Security

Oxford University lab with COVID-19 research links targeted by hackers

February 27, 2021
Fastest VPN in 2021 | ZDNet
Internet Security

Fastest VPN in 2021 | ZDNet

February 27, 2021
Next Post
How to Use Storytelling in Marketing: Neuroscience Insights

How to Use Storytelling in Marketing: Neuroscience Insights

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Machine Learning as a Service (MLaaS) Market 2020 Emerging Trend and Advancement Outlook 2025
Machine Learning

Key Company Profile, Production Revenue, Product Picture and Specifications 2025

February 28, 2021
Cybercrime groups are selling their hacking skills. Some countries are buying
Internet Security

Cybercrime groups are selling their hacking skills. Some countries are buying

February 28, 2021
New AI Machine Learning Reduces Mental Health Misdiagnosis
Machine Learning

Machine Learning May Reduce Mental Health Misdiagnosis

February 28, 2021
Why would you ever trust Amazon’s Alexa after this?
Internet Security

Why would you ever trust Amazon’s Alexa after this?

February 28, 2021
AI & ML Are Not Same. Here's Why – Analytics India Magazine
Machine Learning

AI & ML Are Not Same. Here's Why – Analytics India Magazine

February 27, 2021
Microsoft: We’ve open-sourced this tool we used to hunt for code by SolarWinds hackers
Internet Security

Microsoft: We’ve open-sourced this tool we used to hunt for code by SolarWinds hackers

February 27, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Key Company Profile, Production Revenue, Product Picture and Specifications 2025 February 28, 2021
  • Cybercrime groups are selling their hacking skills. Some countries are buying February 28, 2021
  • Machine Learning May Reduce Mental Health Misdiagnosis February 28, 2021
  • Why would you ever trust Amazon’s Alexa after this? February 28, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates