FireEye Uncovers Decade-Long Cyber Espionage Campaign Targeting South East Asia

  • 13 April 2015
  • 2 replies
  • 12 views

Userlevel 7
Badge +54
By Mike Lennon on April 12, 2015
 
FireEye on Sunday uncovered details of a decade-long cyber espionage campaign carried out by China targeting governments, journalists and businesses in South East Asia and India.

Likely state sponsored by the Chinese government, FireEye said the threat actor group has been conducting cyber espionage operations since at least 2005 and is one of the first to use malware that infects air-gapped networks.

Dubbed APT30 by FireEye, the group is supported by seasoned software developers following well-organized software development practices.
 
Full Article

2 replies

Userlevel 7
Badge +54
13th April 2015   By Danny Palmer
 
http://www.computing.co.uk/IMG/811/301811/03oct14-andy-radovic-shutterstock-149807798-370x229.jpg?1418022045
 
State-sponsored Chinese hackers have been conducting cyber espionage against South Asian governments and corporations for at least a decade, according to researchers from security company FireEye.
 
It isn't the first time the Chinese government has been accused of backing cyber attacks against critical infrastructure of other nations: the US Senate has also claimed that Chinese hackers repeatedly breached the networks of US military contractors over a sustained period.
 
The latest accusation of state-sponsored spying by China is made in FireEye's new threat intelligence report, APT30 and the Mechanics of a Long-Running Cyber Espionage Operation. The 65-page document details how cyber-crime group APT30 ran a professional operation in order to spy on governments and corporations across Southeast Asia and India.
 
Full Article
Userlevel 7
By Jeremy Kirk
 
An otherwise unremarkable hacking group likely aligned with China appears to be one of the first to have targeted so-called air-gapped networks that are not directly connected to the Internet, according to FireEye.
The computer security firm released a 69-page technical report on Sunday on the group, which it calls APT (Advanced Persistent Threat) 30 and that targets organizations in southeast Asia and India.
 
FireEye picked up on it after some of the malware used by the group was found to have infected defense-related clients in the U.S., said Jen Weedon, manager of strategic analysis with FireEye.
APT 30 has operated since at least 2005. It has targeted people through spear phishing, or sending emails containing malicious attachments or harmful linkfull article

Reply