Personal data on over 8,100 individuals and confidential business information likely exposed in June 2019 incident. A data breach at Japan’s Mitsubishi Electric that may have exposed some 200 MB of personal and confidential business data is the latest reminder of the growing threat many organizations face from sophisticated cyber espionage groups. Mitsubishi on Monday
Dozens of organizations across multiple sectors have become victims of APT20 in the past two years. An advanced persistent threat (APT) actor likely operating out of China has, for the past two years at least, been quietly targeting organizations in the United States and around the globe in a sweeping espionage campaign. Among its dozens
APT41’s new campaign is latest to highlight trend by Chinese threat groups to attack upstream service providers as a way to reach its intended targets, FireEye says. APT41, a Chinese hacking group known for its prolific state-sponsored espionage campaigns, has begun targeting telecommunications companies with new malware designed to monitor and save SMS traffic from
Symantec identifies new ‘Tortoiseshell’ nation-state group as the attackers. In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers’ ultimate targets in that region. Researchers at Symantec say the attackers have
A US national and Chinese national have been charged with conspiring to steal General Electric’s trade secrets surrounding turbine technologies. A former General Electric (GE) engineer and Chinese businessman have been charged with economic espionage and conspiracy to steal GE’s trade secrets related to turbine technologies, with the intention of using the information to benefit
Stealthy and well-heeled hacking group went undetected for five years and wields a massive attack framework of some 80 different modules. It’s an expansive cyber espionage operation that canvasses a victim’s network with backdoors, loaders, keyloggers, audio recorders, screen- and webcam grabbers, and even siphons data from printer-queues, burned CDs, and Apple iOS smartphone backups.
Newly named APT39 hacking team exemplifies Iran’s growing sophistication in nation-state hacking operations. Iran’s nation-state hacking machine mostly is known for its destructive cyberattacks: first with Web defacements, then crippling distributed-denial-of-service (DDoS) attacks, and most recently, data-wiping. But Iran increasingly is increasingly honing its operations in pure intelligence-gathering cyber espionage. Cyber spying is nothing new,