Tag: china
-
Feds investigate China’s Salt Typhoon amid campaign phone hacks
by
in SecurityNewsFirst seen on theregister.com Jump to article: www.theregister.com/2024/10/28/feds_investigate_chinas_salt_typhoon/
-
Aus China: Cyberangriff auf US-Provider schlimmster in der US-Geschichte
by
in SecurityNewsVor etwa zwei Wochen ist in den USA ein Cyberangriff auf verschiedene Provider entdeckt worden, es ging um Spionage. Die Angreifer sind weiterhin im System. First seen on heise.de Jump to article: www.heise.de/news/Aus-China-Cyberangriff-auf-US-Provider-schlimmster-in-der-US-Geschichte-10097659.html
-
Chinese Hackers Breached Deep Into US Telecom to Spy on Calls and Texts
by
in SecurityNewsIn a breach that lawmakers are calling the most serious in U.S. history, Chinese hackers infiltrated the nation’s telecommunications systems, gaining the ability to listen to phone conversations and read text messages by exploiting outdated equipment and vulnerabilities in network connections. The revelations come as investigators scramble to understand the full scope of the intrusion.…
-
Chinese APTs Shift Tactics to Evade Detection and Maintain Stealth
In light of increasing global tensions and heightened scrutiny, Chinese Advanced Persistent Threat (APT) groups are adapting their strategies to avoid detection and maintain stealth in their cyber espionage operations.... First seen on securityonline.info Jump to article: securityonline.info/chinese-apts-shift-tactics-to-evade-detection-and-maintain-stealth/
-
Volt Typhoon: Chinese State-Sponsored APT Targets U.S. Critical Infrastructure
by
in SecurityNewsThe Tenable Security Response Team has uncovered critical details about Volt Typhoon, a state-sponsored Advanced Persistent Threat (APT) group linked to the People’s Republic of China. The group has been... First seen on securityonline.info Jump to article: securityonline.info/volt-typhoon-chinese-state-sponsored-apt-targets-u-s-critical-infrastructure/
-
BTS #42 The China Threat
by
in SecurityNewsIn this episode, Paul Asadoorian, Allan Alford, and Josh Corman discuss the growing threat posed by China, particularly in the context of cyber operations and geopolitical ambitions. They explore the implications of China’s strategies, the vulnerabilities in critical infrastructure, and the need for transparency and trust in digital systems. The conversation highlights the urgency of……
-
Telcos subjected to Chinese cyberespionage intrusions
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/telcos-subjected-to-chinese-cyberespionage-intrusions
-
Chinese APT Gelsemium Deploys ‘Wolfsbane’ Linux Variant
In a sign of the times, a backdoor malware whose ancestors date back to 2005 has morphed to target Linux systems. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/chinese-apt-gelsemium-wolfsbane-linux-variant
-
Chinese hackers target Linux with new WolfsBane malware
A new Linux backdoor called ‘WolfsBane’ has been discovered, believed to be a port of Windows malware used by the Chinese ‘Gelsemium’ hacking group. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/chinese-gelsemium-hackers-use-new-wolfsbane-linux-malware/
-
Cryptohack Roundup: No Prison Time for FTX’s Gary Wang
by
in SecurityNewsAlso: Bitfinex Launderer Razzlekhan Gets 18-Month Sentence. This week, sentences in FTX, Bitfinex and Helix cases, a $25.5M Thala hack, the WazirX hack and South Korea probed UpBit. U.S. lawmakers want a crackdown on Tornado. U.S. Prosecutors may scale back crypto cases. BIT Mining fined $10M and the Chinese Communist Party expelled a key blockchain…
-
Chinese ship casts shadow over Baltic subsea cable snipfest
by
in SecurityNewsDanish military confirms it is monitoring as Swedish police investigate. Cloudflare says impact was ‘minimal’ First seen on theregister.com Jump to article: www.theregister.com/2024/11/21/chinese_ship_baltic_cable/
-
Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor
by
in SecurityNewsThe China-aligned advanced persistent threat (APT) actor known as Gelsemium has been observed using a new Linux backdoor dubbed WolfsBane as part of cyber attacks likely targeting East and Southeast Asia.That’s according to findings from cybersecurity firm ESET based on multiple Linux samples uploaded to the VirusTotal platform from Taiwan, the Philippines, and Singapore in…
-
North Korean Front Companies Impersonate U.S. IT Firms to Fund Missile Programs
by
in SecurityNewsThreat actors with ties to the Democratic People’s Republic of Korea (DPRK) are impersonating U.S.-based software and technology consulting businesses in order to further their financial objectives as part of a broader information technology (IT) worker scheme.”Front companies, often based in China, Russia, Southeast Asia, and Africa, play a key role in masking the workers’…
-
China’s Surveillance State Is Selling Citizen Data as a Side Hustle
by
in SecurityNewsChinese black market operators are openly recruiting government agency insiders, paying them for access to surveillance data and then reselling it online”, no questions asked. First seen on wired.com Jump to article: www.wired.com/story/chineses-surveillance-state-is-selling-citizens-data-as-a-side-hustle/
-
Inside Sophos’ 5-Year War With the Chinese Hackers Hijacking Its Devices
by
in SecurityNewsSophos went so far as to plant surveillance implants on its own devices to catch the hackers at work, and in doing so, revealed a glimpse into China’s… First seen on wired.com Jump to article: www.wired.com/story/sophos-chengdu-china-five-year-hacker-war/
-
LIMINAL PANDA A Chinese State-Sponsored Espionage Targeting Telecoms
by
in SecurityNewsCrowdStrike has revealed a new China-nexus state-sponsored adversary tracked as LIMINAL PANDA, which has been systematically targeting telecommunications providers since at least 2020. This revelation comes ahead of Adam Meyers,... First seen on securityonline.info Jump to article: securityonline.info/liminal-panda-a-chinese-state-sponsored-espionage-targeting-telecoms/
-
Chinese cyberspies, Musk’s Beijing ties, labelled ‘real risk’ to US security by senator
by
in SecurityNewsMeet Liminal Panda, which prowls telecom networks in South Asia and Africa First seen on theregister.com Jump to article: www.theregister.com/2024/11/20/musk_chinese_cyberspies/
-
Coast Guard Warns of Continued Risks in Chinese Port Cranes
by
in SecurityNewsMilitary Says Ship-to-Shore Cranes Made in China Include Dangerous Security Flaws. The United States Coast Guard is continuing to warn of significant security risks embedded in ship-to-shore cranes developed by companies with ties to Beijing while issuing new sensitive requirements for ports operating Chinese-made cranes across the country. First seen on govinfosecurity.com Jump to article:…
-
China’s ‘Liminal Panda’ APT Attacks Telcos, Steals Phone Data
by
in SecurityNewsIn US Senate testimony, a CrowdStrike exec explained how this advanced persistent threat penetrated telcos in Asia and Africa, gathering SMS messages, unique identifiers, and other metadata along the way. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/china-liminal-panda-telcos-phone-data
-
Volt Typhoon Attacking U.S. Critical Infra To Maintain Persistent Access
by
in SecurityNews
Tags: access, china, communications, cyber, exploit, infrastructure, network, technology, threat, vulnerabilityVolt Typhoon, a Chinese state-sponsored threat actor, targets critical infrastructure sectors like communications, energy, transportation, and water systems by pre-positions itself in target networks, often exploiting vulnerabilities in operational technology (OT) environments. Known for persistence and patient operations, Volt Typhoon has been tracked under various aliases, including BRONZE SILHOUETTE, Voltzite, Insidious Taurus, DEV-0391, UNC3236, and…
-
African Reliance on Foreign Suppliers Boosts Insecurity Concerns
by
in SecurityNewsRecent backdoor implants and cyber-espionage attacks on their supply chains have African organizations looking to diversify beyond Chinese, American tech vendors. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/african-reliance-on-foreign-suppliers-boosts-insecurity
-
Chinese APT Group Targets Telecom Firms Linked to Belt and Road Initiative
by
in SecurityNewsCrowdStrike unveiled a new Chinese-aligned hacking group allegedly spying on telecom providers First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/chinese-apt-targets-telecoms-bri/
-
Acemagician AM08Pro im Test: Lohnt sich ein 500-Euro-Mini-PC aus China?
by
in SecurityNews
Tags: chinaWir testen einen Mini-PC mit etwas betagter Top-Notebook-CPU, aber einem Kampfpreis. Was taugen die Angebote chinesischer Hersteller – und können sie Gaming? First seen on golem.de Jump to article: www.golem.de/news/acemagician-am08pro-im-test-lohnt-sich-ein-500-euro-mini-pc-aus-china-2411-190789.html
-
China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks
by
in SecurityNewsA new China-linked cyber espionage group has been attributed as behind a series of targeted cyber attacks targeting telecommunications entities in South Asia and Africa since at least 2020 with the goal of enabling intelligence collection.Cybersecurity company CrowdStrike is tracking the adversary under the name Liminal Panda, describing it as possessing deep knowledge about telecommunications…
-
China-linked group abuses Fortinet 0-day with post-exploit VPN-credential stealer
by
in SecurityNewsNo word on when or if the issue will be fixed First seen on theregister.com Jump to article: www.theregister.com/2024/11/19/china_brazenbamboo_fortinet_0day/
-
US Agencies Urged to Combat Growing Chinese Cyberthreat
by
in SecurityNewsExperts Call on Feds to Step Up Defense Against Escalating Chinese Threats. A panel of cybersecurity experts and top industry officials pushed lawmakers and the federal government to step up their defenses against escalating cyberthreats from China, citing recent high-profile examples of evidence that Beijing is increasingly targeting the U.S. with sophisticated attacks. First seen…
-
China’s top messaging app WeChat banned from Hong Kong government computers
by
in SecurityNewsFirst seen on theregister.com Jump to article: www.theregister.com/2024/10/24/hong_kong_wechat_ban/
-
Bipartisan Senate bill targets supply chain threats from foreign adversaries
by
in SecurityNewsThe bill would strengthen oversight powers for the body charged with investigating IT products from China and other foes. First seen on cyberscoop.com Jump to article: cyberscoop.com/federal-acquisition-security-council-improvement-act-supply-chain-security/
-
Fortinet VPN zero-day leveraged in new Chinese credential theft campaign
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/fortinet-vpn-zero-day-leveraged-in-new-chinese-credential-theft-campaign
-
China Privacy Law: Data Management Audits Are Coming in 2025
by
in SecurityNewsAttorney James Gong Examines Upcoming Regulations Related to Non-Personal Data. In 2025, companies in China will face additional obligations when data protection audits become mandatory, setting a new benchmark for compliance with privacy laws. China is also expected to introduce regulations on non-personal data to establish a framework for ethical and secure data usage. First…