Chinese hackers are now focusing on the outer layers of target networks, even antivirus software and firewalls, as an entry point for stealthy cyber attacks that can last for years.
Amnesty International Canada experienced a security breach on October 5 with the ultimate conclusion being that state-sponsored Chinese hackers penetrated the system for espionage purposes.
The US Secret Service is now pointing the finger at state-backed Chinese hackers, accusing a known advanced persistent threat group APT41 of stealing about $20 million of US Covid benefits during the pandemic.
The Chinese hackers are distributing backdoored Web3 wallets, primarily targeting searches for Coinbase Wallet, imToken, MetaMask and Token Pocket, and are focused on both iOS and Android users.
Cyber espionage group is thought to have been in action since at least 2013, with a heavy focus on certain APAC countries and regions. The Chinese hackers also focuses in on political targets.
Advisory warns that state-backed Chinese hackers have deep penetration into "major" US telcos, and are getting in by compromising an assortment of networking equipment and routers.
The purpose of the cyber attack on WSJ appeared to be espionage, with information exfiltrated from email and Google Drive accounts since at least February 2020. Mandiant believes government-backed Chinese hackers conducted the operation.
Palo Alto Networks identified a Chinese cyber espionage campaign targeting 370 critical infrastructure, education, healthcare, and technology organizations through vulnerable Zoho servers.
The Metropolitan Transportation Authority says that Chinese hackers breached three computers in the New York subway via Ivanti’s Pulse Connect Secure VPN critical vulnerabilities.
McAfee researchers discovered a cyber espionage campaign involving Chinese Red Delta and Mustang Panda hackers trying to steal 5G technology secrets using a fake Huawei website.