Thursday, February 22, 2024

8 World’s Biggest Tech Giants Including TCS, CSC, HPE, NTT Data Hacked by Chinese Government Sponsored Hackers

A new shocking report reveals eight of the world’s biggest technology service giants hacked by the Chinese Ministry of State Security sponsor hackers since 2014.

Suspected hacking attempts are initiated by a team of hackers who resides in China against major well know tech giants including Fujitsu, Tata Consultancy Services, NTT Data, Dimension Data, Computer Sciences Corporation, and DXC Technology. HPE.

Groups of threat actors are taking advantage of weaknesses in these corporate companies, their customers and exploited their network under the massive campaign Known as Cloud Hopper.

Chinese Government sponsored hacking group also known as APT 10 Threat actors is one of the sophisticated hacking group in the world and the group mostly targeting commercial activities including aviation, satellite, and maritime technology, industrial factory automation, finance, telecommunications and consumer electronics, computer processor technology, information technology services.

Recently, two hackers, Zhu and Zhang members from Chinese state sponsor APT group were working under the Cloud Hopper campaign, announced as most wanted cyber criminals by FBI for identity theft and fraud.

These massive campaign was intended to steal the industrial or commercial secrets  and many of the victims unsure about what kind of data was stolen.

According to Routers Report, The campaign also highlights the security vulnerabilities inherent in cloud computing, an increasingly popular practice in which companies contract with outside vendors for remote computer services and data storage.

Routers interviewed almost 30 people involved in the Cloud Hopper investigations including former and current companies executives, government officials, security researchers, and also router reviewed hundreds of pages of internal company documents, court filings.

Chinese hacking group started these attack mostly by initiating by spear phishing attack targeting the respective company employees and drop the malware to steal the sensitive data such as a password.

NTT Data, Dimension Data, Tata Consultancy Services, Fujitsu and IBM declined to comment. IBM has previously said it has no evidence sensitive corporate data was compromised by the attacks.

Chinese government completely denied all the accusations involved in this campaign.“The Chinese government has never in any form participated in or supported any person to carry out the theft of commercial secrets,” Chinese Foreign Ministry said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read

Hacking Group Fxmsp Claims they Hacked 3 Major US Antivirus Companies

Wipro Security Breach – Employees’ accounts Hacked Through Advanced Phishing Campaign

Toyota Hacked – Hackers Leaked 3.1 Million Customers Sensitive Information Online


Latest articles

Beware of New AsukaStealer Steal Browser Passwords & Desktop Screens

An updated version of the ObserverStealer known as AsukaStealer was observed to be advertised as...

US to Pay $15M for Info About Lockbit Ransomware Operator Data

In a significant move against cybercrime, the U.S. government has announced a bounty of...

Earth Preta Hackers Abuses Google Drive to Deploy DOPLUGS Malware

Threat actors abuse Google Drive for several malicious activities due to its widespread use,...

Swiggy Account Hacked, Hackers Placed Orders Worth Rs 97,000

In a startling incident underscoring the growing menace of cybercrime, a woman's Swiggy account...

Beware of VietCredCare Malware that Steals businesses’ Facebook Accounts

A new cybersecurity threat targeting Facebook advertisers in Vietnam, known as VietCredCare, has emerged....

Google Chrome 122 Update Addresses Critical Security Vulnerabilities

Google has recently unveiled Chrome 122, a significant milestone for the widely used web...

New Malicious PyPI Packages Use DLL Sideloading In A Supply Chain Attack

Researchers have discovered that threat actors have been using open-source platforms and codes for...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles