Jump to content
  • Sign Up
×
×
  • Create New...

Recommended Posts

  • Diamond Member



US authorities charge seven over ******** hacking

The US Department of Justice (DoJ) has

This is the hidden content, please
charging seven ******** nationals with *********** to commit computer intrusions and *********** to commit wire ******, alleging their involvement in the state-backed APT31 hacking group over a 14-year *******.

Concurrent with new sanctions issued today by deputy prime minister Oliver Dowden, APT31 is accused by the Americans of a wide-ranging campaign of espionage furthering the intelligence objectives of the ******** government.

Those named are Ni Gaobin, 38; Weng Ming, 37; Cheng Feng, 34; Peng Yaowen, 38; Sun Xiaohui, 38; Xiong Wang, 35; and Zhao Guangzong, 38. All are believed to be located in China, and it is highly unlikely they will face a court.

“Over 10,000 malicious emails, impacting thousands of victims, across multiple continents. As alleged in today’s indictment, this prolific global hacking operation – backed by the People’s Republic of China government – targeted journalists, political officials and companies to repress critics of the ******** regime, compromise government institutions and steal trade secrets,” said US deputy attorney general Lisa Monaco.

“The Department of Justice will relentlessly pursue, expose and hold accountable cyber ********** who would undermine democracies and threaten our national security.”

Attorney general Merrick Garland added: “The Justice Department will not tolerate efforts by the ******** government to intimidate Americans who serve the public, silence the dissidents who are protected by ********* laws, or steal from ********* businesses.

“This case serves as a reminder of the ends to which the ******** government is willing to go to target and intimidate its critics, including launching malicious cyber operations aimed at threatening the national security of the ******* States and our allies.”

“This case serves as a reminder of the ends to which the ******** government is willing to go to target and intimidate its critics, including launching malicious cyber operations aimed at threatening the national security of the ******* States and our allies”
Merrick Garland, US attorney general

The US said it was pulling back the curtain on China’s vast hacking operation, underscoring the need to remain vigilant to cyber security threats and cyber-enabled malign influence campaigns, especially in the run-up to the fraught presidential election in November 2024, which will be a rematch of the 2020 contest between Joe Biden and Donald Trump.

The DoJ said it would continue to leverage all possible tools to disrupt malicious cyber actors threatening both US and global security.

Wuhan-based hackers

The alleged defenders supposedly worked alongside dozens of identified ******** Ministry of State Security intelligence officers, contractors and support personnel, as part of a cyber espionage programme run out of the city of Wuhan, under the auspices of the Hubei State Security Department. Their activities were concealed through two front companies known as Wuhan XRZ and Wuhan Liuhe.

APT31’s activity allegedly dates back at least to 2010, and the defendants are thought to have been involved in global hacking campaigns since then, targeting political dissidents and their supporters both inside and outside of China, government and political officials, political candidates and campaign officials, and companies, particularly in the tech sector. They are thought to have notched up thousands of victims around the world, including the ***’s Electoral Commission where they accessed records of millions of *** voters.

Often, their attacks began with phishing emails purporting to be from legitimate news outlets and journalists, frequently containing genuine news articles. However, said the DoJ, these malicious emails contained hidden tracking links that returned information on the recipient – such as their location, IP address, network schematics and device information – to APT31’s command and control infrastructure.

This data was then used to enable more direct and sophisticated targeted hacking, including against the recipients’ home broadband equipment and personal devices.

Once compromised, APT31 used living-off-the-land techniques and zero-day exploits to maintain persistence and delve deeper into victims’ networks, resulting in the confirmed compromise of economic plans, intellectual property, trade secrets, and more besides.

Adam Marrè, chief information security officer at Arctic Wolf and a former FBI agent, commented: “Anyone who has worked in cyber security for any amount of time will not be at all surprised by this report… China has been conducting industrial levels of cyber ****** and cyber attacks on western governments, individuals and businesses for dozens of years. Beijing continues to see cyber as a natural extension of their statecraft and have seldom been afraid to utilise cyber techniques to further their own national interests. 

“2024 will see multiple influential elections, not least in the *** and US, and it is therefore more important than ever that governments and law enforcement are on standby for actions by China and other nation-states looking to utilise cyber techniques to destabilise rivals and erode their power.”

Marrè said it was good to see governments being more transparent about the risks actors like APT31 pose to democratic processes, and good to know law enforcement agencies are actively working to combat these risks.

“Doing so is critical to preserving and increasing trust in the election system and protecting our vital democracies,” he said.





This is the hidden content, please

#authorities #charge #******** #hacking

This is the hidden content, please

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.