ADD ANI AS A TRUSTED SOURCE
googleads
Menu
Asia

China's hacking groups APT41, APT27 target government institutions, companies

Beijing [China], August 31 (ANI): China's state-sponsored hacking group dubbed "Advanced Persistent Threats (APT)" is a decade-old group that targets government institutions and companies globally.

ANI Aug 31, 2022 23:16 IST googleads

Representative Image

Beijing [China], August 31 (ANI): China's state-sponsored hacking group dubbed "Advanced Persistent Threats (APT)" is a decade-old group that targets government institutions and companies globally.
Grusha Bose, a Fellow Researcher, writing in Indo-Pacific Center for Strategic Communications (IPCSC) said that The APT41 and APT27 are the oldest and most dangerous groups currently active and have shown advanced capabilities in jeopardizing a country's national security.
China's APTs hacker groups use unusual malware tools to exploit government institutions' vulnerabilities to meet its espionage agenda.
They keep altering their attack strategies to avoid being detected. Chinese espionage operators are aligned with China's Five-Year Development Plans.
Typically, these groups are listed by numbers based on their activities, target sectors and which government-backed they are, so China's attributed APTs, as per a report by Mandiant are -- APT 1 (PLA Unit 61398), APT 2 (PLA Unit 61486), APT 4 (Maverick Panda, Sykipot Group, Wisp), APT 16, APT 26, APT27, APT40, APT41 (Double Dragon, Winnti Group, Barium, or Axiom), APT30, APT31, and so on, the list continues.
Each of these APTs has played a major role that leverages strategic national securities of the targeted government institutions and companies during a specific year of their activity.
For example, APT 26 targeted the Aerospace, Defence & Energy sectors, among others while APT 16 focused was Japanese and Taiwanese organizations in the high-tech, government services, media and financial services industries.
The APT41 is also infamously knowns as 'Double Dragon,' for its dual espionage and cybercrime operations -- that carries out Chinese state-sponsored espionage activities targeting government institutions in parallel with personal financially motivated operations as well, said Bose.
They also go by the names BARIUM, Winnti, LEAD, WICKED SPIDER, WICKED PANDA, Blackfly, Suckfly, and Winnti Umbrella.
The APT41 blatantly engaged in financially motivated activity targeting the video game industry including manipulating virtual currencies as per FireEye reports.
Using its access to a game production environment, APT41 generated millions of dollars in less than 3 hours from a popular game's virtual currency, reported IPCSC.
Furthermore, the money is then distributed to multiple accounts and most likely sold and laundered in an underground market which is hard to trace.
To add a cherry on top of their 'personal financial gain' -- they also targeted payment services specializing in handling 'in-game' transactions and Real Money Transfer (RMT) purchases resorting to ransomware to salvage their attempt since they could not monetize the in-game currency.
As per the FireEye Intelligence report, the hacker group has been active since 2012, initially targeting the video game industry before expanding to exploit government institutions' national security vulnerabilities.
As per the reports, APT41 has targeted organizations in 14 countries including Hong Kong over the span of 7 years -- France, India, Italy, Myanmar, Singapore, South Africa, Switzerland, Japan, the Netherlands, South Korea, Thailand, Turkey, the United States, and the United Kingdom.
One such account, the APT41 targeted medical device companies and pharmaceuticals. This is alarming because, through these devices, they wanted to acquire knowledge of the public's health history or a company's R&D on a particular product -- that would give them leverage to steer the pharmaceutical market by producing a required drug or perhaps start a bioweapon war -- how COVID-19 started is still speculative.
Similarly, APT27 is yet another Chinese hack group that has targeted multiple organizations using the very same tactics and tools as its counterpart APT41.
APT27 engaged in intellectual property theft, usually focusing on the data and projects as per Mandiant reports. The group has targeted institutions globally including North and South America, Europe, and the Middle East. APT27 focused on business services, high-tech, government institutions, and energy; but mostly aerospace sector, transport, and travel industries, said Bose.
Lately, the attributed Chinese APTs have become active due to Taiwan tension. As per reports, Taiwan has been experiencing non-stop cyberattacks from APT27 -- the latest target was the National Taiwan University (NTU) on August 7, reported IPCSC.
The websites of the NTU displayed words in Chinese that suggest -- "There is only one China in the world". As reported by Taiwan News, it has been an ongoing attack since the visit by the US House Speaker, Nancy Pelosi.
APT27 posted a Youtube video on August 3, threatening to conduct a 'special cyber operation' against Taiwan. The hacker group also took responsibility for the string of cyber-attacks and warned that more would be coming.
The hacker group claimed that over 200,000 Taiwanese-connected devices are at their mercy. If Taiwan continues to provoke the situation, they would leak data from the Taiwan government compromising their national security and announcing some 'Taiwanese equipment zero-day'. (ANI)

Get the App

What to Read Next

Europe

Blasphemy laws in Pakistan target religious minorities: GHRD

Blasphemy laws in Pakistan target religious minorities: GHRD

At the 61st session of the United Nations Human Rights Council, the organisation Global Human Rights Defence (GHRD) raised concerns over the continued misuse of blasphemy laws in Pakistan and their impact on religious minorities.

Read More
Asia

China’s expanding system of censorship exposed in Dharamshala

China’s expanding system of censorship exposed in Dharamshala

The event titled "Understanding China's System of Political Repression: Voices of Resistance through Art and Journalism" brought together prominent voices critical of China's information control, as reported by Phayul.

Read More
Asia

Tibetan Women’s Association organises protest against China

Tibetan Women’s Association organises protest against China

It's an event to remember the day when Tibetan women from all three provinces of Tibet, for the first time in the history of Tibet, stood together and raised their voice against the brutal Chinese military forces that were occupying Tibet in 1959.

Read More
Asia

India’s Consul General meets Ant Group to boost tech ties

India’s Consul General meets Ant Group to boost tech ties

India's Consul General in Shanghai, Pratik Mathur, met Ant Group leadership to discuss fintech and digital economy opportunities. This follows high-level engagements with Shanghai's Mayor, aligned with Prime Minister Narendra Modi's "Reform, Perform and Transform" mantra to strengthen bilateral and multilateral cooperation through the SCO and BRICS.

Read More
US

UNSC adopts resolution condemning Iran’s “egregious attacks”

UNSC adopts resolution condemning Iran’s “egregious attacks”

The UN Security Council has adopted a resolution condemning Iran's "egregious attacks" against regional neighbours, demanding an immediate halt to hostilities and interference with maritime trade. While 13 members voted in favour, Russia and China abstained, with Tehran dismissing the move as a "manifest injustice" and a "serious setback."

Read More
Home About Us Our Products Advertise Contact Us Terms & Condition Privacy Policy

Copyright © aninews.in | All Rights Reserved.