Diamond Member Pelican Press 0 Posted March 26, 2024 Diamond Member Share Posted March 26, 2024 Cyber-attacks linked to ******** spy agencies are increasing, say analysts | Cybercrime Cyber-attacks linked to ******** intelligence agencies are increasing in capability and frequency as they seek to test foreign government responses, analysts have warned in the wake of revelations about a mass hacking of *** data. On Tuesday, the *** and US governments accused hacking group Advanced Persistent Threat 31 (APT 31), backed by China’s government spy agency, of conducting a years-long cyber-******* campaign, targeting politicians, national security officials, journalists and businesses. The *** said the hackers had potentially gained access to information on tens of millions of *** voters held by the Electoral Commission, as well as for cyber-espionage targeting lawmakers who have been outspoken about threats from China. Both the US and *** governments announced sanctions against linked ******** companies and individuals. Also on Tuesday, the New Zealand government said it had raised concerns with the ******** government about its involvement in an ******* which targeted the country’s parliamentary entities in 2021. Analysts told the Guardian there were clear signs of an increase in cyber-attacks which appeared to be conducted by ******** actors, often with links to China’s intelligence agencies and government. “Some of the hacking groups are information security firms contracted to ******** intelligence units to carry out attacks on specific targets, such as the recent case of iSoon Information,” said analyst Chung Che, from Taiwan-based cyber threat analysis firm T5. T5 had monitored an increase in “constantly evolving” hacking efforts by ******** groups in the Pacific region and Taiwan over the last three years. “We believe that their purpose is to infiltrate specific targets and steal important information and intelligence, whether it be political, military or commercial,” Chung said. Chung said there was not sufficient information to specifically trace the activity all the way to China’s top leadership (and Beijing resolutely rejects the allegations), but “given China’s system of no distinction between party and state, it is true that we cannot rule out the possibility of instructions coming from the top”. Several analysts said western governments, however, have become much more willing to name China as the perpetrator, after years of avoiding antagonising the leaders of the world’s second largest economy. “That earlier reticence to criticise has given way to a more vocal stance and I think that’s probably because the scale of the threat and the actual intrusions has risen. They are more serious threats now,” said David Tuffley, a senior lecturer in cybersecurity at Griffith University in Australia. The *** announcement followed revelations last month that a ******** hacking network known as Volt Typhoon had been lying dormant inside US critical infrastructure for as long as five years, “pre-positioning” itself for future acts of sabotage. That operation sparked alarm among Five Eyes observers as it indicated a shift away from intelligence-gathering espionage towards warfare preparation. Tuffley said cyber-attacks were part of China’s greyzone activity – meaning acts that approach but do not reach the threshold of warfare. Much of the activity is regionally focused, targeting Taiwan and other countries disputing claims in the South China Sea. But these cyberattacks had a far broader reach. “The whole point to make about all of this is that China is obviously adopting a much more muscular stance,” said Tuffley. “It knows it doesn’t have the military capability to defeat the Americans, the British, Australians, ********* and Koreans, in a hot war. So they are most unlikely to take it to that point.” Instead it is seeking to cause instability in the target country, and “perhaps a loss of confidence in the operational abilities of that target”. It is also testing its own capabilities up against adversaries’ defences, he said. Tuffley said there was a danger of escalation. Other governments like the US and *** had high cyber-espionage capabilities themselves, but were not publicly threatening countermeasures against the ******** state. In its statement on Tuesday This is the hidden content, please Sign In or Sign Up accused of conducting the cyber attacks allegedly in breach of US law. That suggested a deep level of knowledge about the attacks, including perhaps through human intelligence sources inside the ******** operations, or a retaliatory information-gathering hack, one analyst said. “Anyone who has worked in cybersecurity for any amount of time will not be at all surprised by this report from the *** authorities,” said Adam Marrè, chief information security officer at Arctic Wolf. “Beijing continues to see cyber as a natural extension of their statecraft and have seldom been afraid to utilise cyber techniques to further their own national interests.” This is the hidden content, please Sign In or Sign Up #Cyberattacks #linked #******** #spy #agencies #increasing #analysts #Cybercrime This is the hidden content, please Sign In or Sign Up Link to comment https://hopzone.eu/forums/topic/7587-cyber-attacks-linked-to-chinese-spy-agencies-are-increasing-say-analysts-cybercrime/ Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now