6.5 C
New York
Saturday, January 23, 2021

A Newly Identified Chinese APT Group Spying On State

Must Read

Third “wave” of coronavirus can be more serious than the current one

The third wave of the coronavirus could have far more serious effects on the population than the ones they...

Scientists find burrows of terrifying gigantic predatory worms in Taiwan

An international team of paleontologists has discovered near the northeast coast of the island of Taiwan the trace fossils...

Two tigers engage in “a battle of titans” in India

The best thing you will watch. Two tigers in India staged a fierce fight that ended as unexpectedly as...
Aakash Molpariya
Aakash started in Nov 2018 as a writer at Revyuh.com. Since joining, as writer, he is mainly responsible for Software, Science, programming, system administration and the Technology ecosystem, but due to his versatility he is used for everything possible. He writes about topics ranging from AI to hardware to games, stands in front of and behind the camera, creates creative product images and much more. He is a trained IT systems engineer and has studied computer science. By the way, he is enthusiastic about his own small projects in game development, hardware-handicraft, digital art, gaming and music. Email: aakash (at) revyuh (dot) com

At Black Hat, security company FireEye presented information on the spying and other activities of a newly identified APT group.

APT 41 is the name of a recently discovered group of cybercriminals that was reported by security firm FireEye at this year’s Black Hat Details. For more than seven years, the group has been active in 15 countries, specializing in industries such as healthcare, hight tech, telecommunications, academia and education, the gaming and travel industries, and news companies. APT stands for “Advanced Persistent Threat” and means complex, targeted attacks.

FireEye has been watching individual members of this group for years. These initially conducted financially motivated operations and later transferred to likely state-sponsored activities. From 2014, the two motivations balanced each other. According to FireEye, this dual threat is “unique among the Chinese players we observe, and the group apparently uses personal tools that are typically used for spy campaigns, are very agile, highly skilled, and well-endowed.”

To date APT 41 has apparently been targeted by companies from France, India, Italy, Japan, Myanmar, the Netherlands, Singapore, South Korea, South Africa, Switzerland, Thailand, Turkey, the United Kingdom, the United States and Hong Kong. According to FireEye, espionage activities target the healthcare, high tech, and telecommunications industries with the intent to gain strategic insights and steal intellectual property. Other cybercriminal operations focus on the video game industry, manipulating virtual currencies, and distributing ransomware.

Their “aggressive and persistent operations for both espionage and cybercrime differentiate APT41 from other players and make it a major threat to various industries,” said Sandra Joyce, Global Threat Intelligence Officer at FireEye.

FireEye’s security experts have also created profiles of 10 states involved in such machinations and identified 40 challenged industries.

- Advertisement -


Please enter your comment!
Please enter your name here

- Advertisement -

Latest News

Third “wave” of coronavirus can be more serious than the current one

The third wave of the coronavirus could have far more serious effects on the population than the ones they...
- Advertisement -

More Articles Like This

- Advertisement -