6.5 C
New York
Thursday, October 21, 2021

A Newly Identified Chinese APT Group Spying On State

Must Read

US CDC Alert: Fresh whole onions linked to Salmonella outbreak

US CDC warned, adding, people who have unlabeled whole red, white, or yellow onions at home to...

A new infectious disease is spreading in New York – experts warn

The city of New York has recorded an upsurge in human cases of leptospirosis, a bacterial disease...

People with this blood group are more exposed to COVID-19 – says research

Recent research adds more evidence that blood type may influence a person's risk for COVID-19 infection and...
Aakash Molpariya
Aakash started in Nov 2018 as a writer at Revyuh.com. Since joining, as writer, he is mainly responsible for Software, Science, programming, system administration and the Technology ecosystem, but due to his versatility he is used for everything possible. He writes about topics ranging from AI to hardware to games, stands in front of and behind the camera, creates creative product images and much more. He is a trained IT systems engineer and has studied computer science. By the way, he is enthusiastic about his own small projects in game development, hardware-handicraft, digital art, gaming and music. Email: aakash (at) revyuh (dot) com

At Black Hat, security company FireEye presented information on the spying and other activities of a newly identified APT group.

APT 41 is the name of a recently discovered group of cybercriminals that was reported by security firm FireEye at this year’s Black Hat Details. For more than seven years, the group has been active in 15 countries, specializing in industries such as healthcare, hight tech, telecommunications, academia and education, the gaming and travel industries, and news companies. APT stands for “Advanced Persistent Threat” and means complex, targeted attacks.

FireEye has been watching individual members of this group for years. These initially conducted financially motivated operations and later transferred to likely state-sponsored activities. From 2014, the two motivations balanced each other. According to FireEye, this dual threat is “unique among the Chinese players we observe, and the group apparently uses personal tools that are typically used for spy campaigns, are very agile, highly skilled, and well-endowed.”

To date APT 41 has apparently been targeted by companies from France, India, Italy, Japan, Myanmar, the Netherlands, Singapore, South Korea, South Africa, Switzerland, Thailand, Turkey, the United Kingdom, the United States and Hong Kong. According to FireEye, espionage activities target the healthcare, high tech, and telecommunications industries with the intent to gain strategic insights and steal intellectual property. Other cybercriminal operations focus on the video game industry, manipulating virtual currencies, and distributing ransomware.

Their “aggressive and persistent operations for both espionage and cybercrime differentiate APT41 from other players and make it a major threat to various industries,” said Sandra Joyce, Global Threat Intelligence Officer at FireEye.

FireEye’s security experts have also created profiles of 10 states involved in such machinations and identified 40 challenged industries.

- Advertisement -


Please enter your comment!
Please enter your name here

- Advertisement -

Latest News

- Advertisement -

More Articles Like This

- Advertisement -