Monday, April 28, 2025
HomeComputer SecurityChinese Hackers from APT 10 Hacking Group Charged for a Cyber Attack...

Chinese Hackers from APT 10 Hacking Group Charged for a Cyber Attack on NASA

Published on

SIEM as a Service

Follow Us on Google News

Two Chinese hackers who are behind the APT 10 Hacking Group charged for compromising Intellectual Property and Confidential Business Information from government agencies NASA & other 45 US Tech giants.

Zhu and Zhang members from Chinese state sponsor APT group associated
with the Chinese Ministry of State Security involved with various cybercrime activities.

APT10 hacking group targeting mostly commercial activities including aviation, satellite and maritime technology, industrial factory automation, automotive supplies, laboratory instruments, banking and finance, telecommunications and consumer electronics, computer processor technology, information technology services.

- Advertisement - Google News

Both are conducting various global campaigns of Cyber attack that target, among other data, intellectual property and confidential business and technological information at managed service providers.

This secret operation implemented against more than 45 technology companies in at least a dozen U.S. states, and U.S. government agencies.

Also Stolen various sensitive data from managed service providers (MSPs) and their government and commercial clients in at least 12 countries, including the UK, Brazil, Canada, Finland, France, Germany, India, Japan, Sweden, Switzerland, and the UAE, as well as the US

In order to perform an illegal hacking operation, both are registered IT infrastructure that the APT10 Group used.

The FBI said they had also hacked into US Navy computer systems and stolen the personal information of more than 100,000 personnel.

Deputy Attorney General Rosenstein said, “The indictment alleges that the defendants were part of a group that hacked computers in at least a dozen countries and gave China’s intelligence service access to sensitive business information,”

According to Department of Justice, “It is galling that American companies and government agencies spent years of research and countless dollars to develop their intellectual property, while the defendants simply stole it and got it for free” said, U.S. Attorney Berman.  “As a nation, we cannot, and will not, allow such brazen thievery to go unchecked.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Indian Cyber Crime Police Arrested Largest Tech Support Scam Operators in India With the Help of Microsoft

UK Teen Finally Arrested for DDoS Attack on ProtonMail Behalf of Russian Hackers Group

42-year-old man Arrested For Hacking More than 2,000 Computers From 50 countries With DarkComet RAT

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

CISA Alerts Users to Security Flaws in Planet Technology Network Products

The United States Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security...

New iOS Vulnerability Could Brick iPhones with Just One Line of Code

A security researcher has uncovered a critical vulnerability in iOS, Apple's flagship mobile operating...

Cybercriminals Selling Sophisticated HiddenMiner Malware on Dark Web Forums

Cybercriminals have begun openly marketing a powerful new variant of the HiddenMiner malware on...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware

The cybersecurity landscape faces an escalating crisis as AgeoStealer joins the ranks of advanced...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Russian Hackers Attempt to Sabotage Digital Control Systems of Dutch Public Service

The Dutch Defense Ministry has revealed that critical infrastructure, democratic processes, and North Sea...