Chinese hackers suspected of spying on US, European and Japanese targets

&Tab;&Tab;<div class&equals;"wpcnt">&NewLine;&Tab;&Tab;&Tab;<div class&equals;"wpa">&NewLine;&Tab;&Tab;&Tab;&Tab;<span class&equals;"wpa-about">Advertisements<&sol;span>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"u top&lowbar;amp">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<amp-ad width&equals;"300" height&equals;"265"&NewLine;&Tab;&Tab; type&equals;"pubmine"&NewLine;&Tab;&Tab; data-siteid&equals;"111265417"&NewLine;&Tab;&Tab; data-section&equals;"2">&NewLine;&Tab;&Tab;<&sol;amp-ad>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;<&sol;div><p>Suspected state-backed Chinese hackers exploited widely used networking devices to spy for months on dozens of high-value government&comma; defence industry and financial sector targets in the US and Europe&comma; according to prominent cybersecurity firm FireEye&period;<&sol;p>&NewLine;<p>And Tokyo police are investigating cyber attacks on some 200 Japanese companies and research organisations&comma; including the country’s space agency&comma; by a hacking group believed to be linked to the Chinese military&comma; Japan’s government said&period;<&sol;p>&NewLine;<p>FireEye said on Tuesday it believed two hacking groups linked to China broke into several targets through Pulse Connect Secure devices&comma; which numerous companies and governments use for secure remote access to their networks&period;<&sol;p>&NewLine;<p>After FireEye released a blog post detailing its findings&comma; the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency issued an alert saying it was aware of &OpenCurlyDoubleQuote;ongoing exploitation” of Pulse Connect Secure that is &OpenCurlyDoubleQuote;compromising US government agencies&comma; critical infrastructure entities&comma; and private sector organisations”&period;<&sol;p>&NewLine;<p>The agency did not provide additional details about which organisations were breached&period;<&sol;p>&NewLine;<p>Ivanti&comma; the Utah-based owner of Pulse Connect Secure&comma; said a limited number of customers &OpenCurlyDoubleQuote;experienced evidence of exploit behaviour”&period; The company said the hackers used three known exploits and a previously unknown one&period;<&sol;p>&NewLine;<p>Charles Carmakal&comma; the chief technology officer at FireEye&comma; said it was still trying to piece together details about the hack but available evidence suggested the hackers were aligned with the Chinese government&period;<&sol;p>&NewLine;<p>Carmakal&comma; whose company discovered in December the months-long SolarWinds hacking campaign attributed to Russian cyberspies&comma; said the Pulse Connect Secure hack had several notable aspects&colon; the hackers were highly skilled&comma; were able to evade multifactor authentication and could stay hidden on a penetrated network even if software was reset or upgraded&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;Their tradecraft is really good&comma;” he said&period;<&sol;p>&NewLine;<figure id&equals;"attachment&lowbar;167675" aria-describedby&equals;"caption-attachment-167675" style&equals;"width&colon; 581px" class&equals;"wp-caption aligncenter"><img src&equals;"https&colon;&sol;&sol;londonglossy&period;com&sol;wp-content&sol;uploads&sol;2021&sol;04&sol;7572AE1D-8744-4021-82D8-53C24E4E9B51&period;jpeg" alt&equals;"" width&equals;"581" height&equals;"424" class&equals;"size-full wp-image-167675" &sol;><figcaption id&equals;"caption-attachment-167675" class&equals;"wp-caption-text">Staff in the control room of the JAXA Institute of Space and Astronautical Science in Sagamihara&comma; near Tokyo<&sol;figcaption><&sol;figure>&NewLine;<p>Meanwhile&comma; Japanese police have forwarded the case involving attacks on the Japan Aerospace Exploration Agency &lpar;JAXA&rpar; to prosecutors for further investigation&comma; chief cabinet secretary Katsunobu Kato told reporters&period;<&sol;p>&NewLine;<p>Police believe a series of hacks of the JAXA were conducted in 2016-2017 by Tick&comma; a Chinese cyberattack group under the direction of a unit of the People’s Liberation Army &lpar;PLA&rpar;&comma; Mr Kato said&period;<&sol;p>&NewLine;<p><&excl;--Ads1--><&sol;p>&NewLine;<p>A suspect in the JAXA case&comma; a Chinese systems engineer based in Japan&comma; allegedly gained access to a rental server by registering himself under a false identity to launch the cyber attacks&comma; Mr Kato said&comma; citing the police investigation&period;<&sol;p>&NewLine;<p>NHK public television said another Chinese national with suspected links to the PLA unit who was in Japan as an exchange student was also investigated in the case&period;<&sol;p>&NewLine;<p>Both men have since left the country&comma; it said&period;<&sol;p>&NewLine;<p>Police are investigating the attackers’ intent and methods&comma; while also pursuing scores of other cyberattacks that they suspect are linked to China’s military&comma; Mr Kato said&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;The involvement of China’s People’s Liberation Army is highly likely&comma;” he said&period;<&sol;p>&NewLine;<p>Mr Kato added that no actual data leak or damage has been found so far but police are urging the companies to strengthen their protection&period;<&sol;p>&NewLine;<p>Japan’s Defence Ministry says cyberattacks are part of rising security threats from China as it becomes more assertive in the region – a shared concern discussed in April 16 talks at the White House between US President Joe Biden and Japanese Prime Minister Yoshihide Suga&period;<&sol;p>&NewLine;<p>In Beijing&comma; Chinese Foreign Ministry spokesperson Wang Wenbin said cyberattacks were a common challenge faced by all countries and warned Japan against wrongly accusing China&period;<&sol;p>&NewLine;&Tab;&Tab;&Tab;<div style&equals;"padding-bottom&colon;15px&semi;" class&equals;"wordads-tag" data-slot-type&equals;"belowpost">&NewLine;&Tab;&Tab;&Tab;&Tab;<div id&equals;"atatags-dynamic-belowpost-69198b89b255a">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<script type&equals;"text&sol;javascript">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;getAdSnippetCallback &equals; function &lpar;&rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;if &lpar; false &equals;&equals;&equals; &lpar; window&period;isWatlV1 &quest;&quest; false &rpar; &rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&sol;&sol; Use Aditude scripts&period;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;tudeMappings &equals; window&period;tudeMappings &vert;&vert; &lbrack;&rsqb;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;tudeMappings&period;push&lpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;divId&colon; 'atatags-dynamic-belowpost-69198b89b255a'&comma;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;format&colon; 'belowpost'&comma;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub; &rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;if &lpar; document&period;readyState &equals;&equals;&equals; 'loading' &rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;document&period;addEventListener&lpar; 'DOMContentLoaded'&comma; window&period;getAdSnippetCallback &rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub; else &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;getAdSnippetCallback&lpar;&rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;script>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;<&sol;div>


Discover more from London Glossy Post

Subscribe to get the latest posts sent to your email.

- Advertisement -
Exit mobile version