Saturday, November 2, 2024
HomeComputer Security8 World's Biggest Tech Giants Including TCS, CSC, HPE, NTT Data Hacked...

8 World’s Biggest Tech Giants Including TCS, CSC, HPE, NTT Data Hacked by Chinese Government Sponsored Hackers

Published on

Malware protection

A new shocking report reveals eight of the world’s biggest technology service giants hacked by the Chinese Ministry of State Security sponsor hackers since 2014.

Suspected hacking attempts are initiated by a team of hackers who resides in China against major well know tech giants including Fujitsu, Tata Consultancy Services, NTT Data, Dimension Data, Computer Sciences Corporation, and DXC Technology. HPE.

Groups of threat actors are taking advantage of weaknesses in these corporate companies, their customers and exploited their network under the massive campaign Known as Cloud Hopper.

- Advertisement - SIEM as a Service

Chinese Government sponsored hacking group also known as APT 10 Threat actors is one of the sophisticated hacking group in the world and the group mostly targeting commercial activities including aviation, satellite, and maritime technology, industrial factory automation, finance, telecommunications and consumer electronics, computer processor technology, information technology services.

Recently, two hackers, Zhu and Zhang members from Chinese state sponsor APT group were working under the Cloud Hopper campaign, announced as most wanted cyber criminals by FBI for identity theft and fraud.

These massive campaign was intended to steal the industrial or commercial secrets  and many of the victims unsure about what kind of data was stolen.

According to Routers Report, The campaign also highlights the security vulnerabilities inherent in cloud computing, an increasingly popular practice in which companies contract with outside vendors for remote computer services and data storage.

Routers interviewed almost 30 people involved in the Cloud Hopper investigations including former and current companies executives, government officials, security researchers, and also router reviewed hundreds of pages of internal company documents, court filings.

Chinese hacking group started these attack mostly by initiating by spear phishing attack targeting the respective company employees and drop the malware to steal the sensitive data such as a password.

NTT Data, Dimension Data, Tata Consultancy Services, Fujitsu and IBM declined to comment. IBM has previously said it has no evidence sensitive corporate data was compromised by the attacks.

Chinese government completely denied all the accusations involved in this campaign.“The Chinese government has never in any form participated in or supported any person to carry out the theft of commercial secrets,” Chinese Foreign Ministry said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read

Hacking Group Fxmsp Claims they Hacked 3 Major US Antivirus Companies

Wipro Security Breach – Employees’ accounts Hacked Through Advanced Phishing Campaign

Toyota Hacked – Hackers Leaked 3.1 Million Customers Sensitive Information Online

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Digital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital wallets enable users to securely store their financial information on smart devices and...

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts

A newly discovered phishing marketplace, ONNX Store, empowers cybercriminals to launch sophisticated attacks against...

Mobile Device Management Vendor Mobile Guardian Hacked

 Mobile Guardian, a leading Mobile Device Management (MDM) vendor, experienced unauthorized access to its...