Monday, April 7, 2025
HomeCyber Security NewsCOVID-19 Research Organizations Attacked by Chinese Hackers Group

COVID-19 Research Organizations Attacked by Chinese Hackers Group

Published on

SIEM as a Service

Follow Us on Google News

FBI warned that Chinese hackers are attacking organizations who plays a vital role in research on COVID-19.

FBI and CISA have warned the organizations and multiple sectors includes state/local/tribal/territorial/private sectors and pharmaceutical and Health care departments.

Due to COVID-19 Pandemic, cyber-attacks are kept increasing and the attackers targeting various sectors via malspam, phishing related attacks.

- Advertisement - Google News

The currently ongoing attacks is investigating as a join operation lead by Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA)

“The attackers attempt to identify and illicitly obtain valuable intellectual property (IP) and public health data related to vaccines, treatments, and testing from networks and personnel affiliated with COVID-19-related research,” FBI, CISA said.

The Research teams have taken the responsibilities by investigating and working on them by maintaining Security and prevent them from threat, such as :

FBI has taken the accountability of defending the U.S. against foreign intelligence, spying, and other cyber operations duties.

CISA is contributing services and information to support the cybersecurity of federal and other sector entities that helps in COVID-19 research and response and they have also taken the accountability to save the nation’s crucial architecture from real cyber threats.

“The FBI and CISA urge all organizations conducting research in these areas to maintain dedicated cybersecurity and insider threat practices to prevent surreptitious review or theft of COVID-19-related material,” the PSA reads.

Preventive Measures :

  • Scan web applications for unwanted access, unusual task and mitigation.
  • Always use multi-factor authentication.
  • Recognize the malicious activity performed by end-users.
  • Always be take care of missing and poor encryption.
  • Upgrade end-to-end encryption.
  • Update Patches of all workstations and servers on time.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Latest articles

Threat Actors Exploit Fake CAPTCHAs and Cloudflare Turnstile to Distribute LegionLoader

In a sophisticated attack targeting individuals searching for PDF documents online, cybercriminals are using...

HellCat, Rey, and Grep Groups Dispute Claims in Orange and HighWire Press Cases

SuspectFile.com has uncovered a complex web of overlapping claims and accusations within the cybercrime...

AI Surpasses Elite Red Teams in Crafting Effective Spear Phishing Attacks

In a groundbreaking development in the field of cybersecurity, AI has reached a pivotal...

Threat Actors Use Windows Screensaver Files as Malware Delivery Method

Cybersecurity experts at Symantec have uncovered a sophisticated phishing campaign targeting various sectors across...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actors Exploit Fake CAPTCHAs and Cloudflare Turnstile to Distribute LegionLoader

In a sophisticated attack targeting individuals searching for PDF documents online, cybercriminals are using...

HellCat, Rey, and Grep Groups Dispute Claims in Orange and HighWire Press Cases

SuspectFile.com has uncovered a complex web of overlapping claims and accusations within the cybercrime...

AI Surpasses Elite Red Teams in Crafting Effective Spear Phishing Attacks

In a groundbreaking development in the field of cybersecurity, AI has reached a pivotal...