Friday, June 14, 2024

8 World’s Biggest Tech Giants Including TCS, CSC, HPE, NTT Data Hacked by Chinese Government Sponsored Hackers

A new shocking report reveals eight of the world’s biggest technology service giants hacked by the Chinese Ministry of State Security sponsor hackers since 2014.

Suspected hacking attempts are initiated by a team of hackers who resides in China against major well know tech giants including Fujitsu, Tata Consultancy Services, NTT Data, Dimension Data, Computer Sciences Corporation, and DXC Technology. HPE.

Groups of threat actors are taking advantage of weaknesses in these corporate companies, their customers and exploited their network under the massive campaign Known as Cloud Hopper.

Chinese Government sponsored hacking group also known as APT 10 Threat actors is one of the sophisticated hacking group in the world and the group mostly targeting commercial activities including aviation, satellite, and maritime technology, industrial factory automation, finance, telecommunications and consumer electronics, computer processor technology, information technology services.

Recently, two hackers, Zhu and Zhang members from Chinese state sponsor APT group were working under the Cloud Hopper campaign, announced as most wanted cyber criminals by FBI for identity theft and fraud.

These massive campaign was intended to steal the industrial or commercial secrets  and many of the victims unsure about what kind of data was stolen.

According to Routers Report, The campaign also highlights the security vulnerabilities inherent in cloud computing, an increasingly popular practice in which companies contract with outside vendors for remote computer services and data storage.

Routers interviewed almost 30 people involved in the Cloud Hopper investigations including former and current companies executives, government officials, security researchers, and also router reviewed hundreds of pages of internal company documents, court filings.

Chinese hacking group started these attack mostly by initiating by spear phishing attack targeting the respective company employees and drop the malware to steal the sensitive data such as a password.

NTT Data, Dimension Data, Tata Consultancy Services, Fujitsu and IBM declined to comment. IBM has previously said it has no evidence sensitive corporate data was compromised by the attacks.

Chinese government completely denied all the accusations involved in this campaign.“The Chinese government has never in any form participated in or supported any person to carry out the theft of commercial secrets,” Chinese Foreign Ministry said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read

Hacking Group Fxmsp Claims they Hacked 3 Major US Antivirus Companies

Wipro Security Breach – Employees’ accounts Hacked Through Advanced Phishing Campaign

Toyota Hacked – Hackers Leaked 3.1 Million Customers Sensitive Information Online


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles