APT41’s new campaign is latest to highlight trend by Chinese threat groups to attack upstream service providers as a way to reach its intended targets, FireEye says. APT41, a Chinese hacking group known for its prolific state-sponsored espionage campaigns, has begun targeting telecommunications companies with new malware designed to monitor and save SMS traffic from
Symantec identifies new ‘Tortoiseshell’ nation-state group as the attackers. In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers’ ultimate targets in that region. Researchers at Symantec say the attackers have
A US national and Chinese national have been charged with conspiring to steal General Electric’s trade secrets surrounding turbine technologies. A former General Electric (GE) engineer and Chinese businessman have been charged with economic espionage and conspiracy to steal GE’s trade secrets related to turbine technologies, with the intention of using the information to benefit
Stealthy and well-heeled hacking group went undetected for five years and wields a massive attack framework of some 80 different modules. It’s an expansive cyber espionage operation that canvasses a victim’s network with backdoors, loaders, keyloggers, audio recorders, screen- and webcam grabbers, and even siphons data from printer-queues, burned CDs, and Apple iOS smartphone backups.
Newly named APT39 hacking team exemplifies Iran’s growing sophistication in nation-state hacking operations. Iran’s nation-state hacking machine mostly is known for its destructive cyberattacks: first with Web defacements, then crippling distributed-denial-of-service (DDoS) attacks, and most recently, data-wiping. But Iran increasingly is increasingly honing its operations in pure intelligence-gathering cyber espionage. Cyber spying is nothing new,