Monday, November 25, 2024
HomeComputer SecurityChinese Hackers from APT 10 Hacking Group Charged for a Cyber Attack...

Chinese Hackers from APT 10 Hacking Group Charged for a Cyber Attack on NASA

Published on

Two Chinese hackers who are behind the APT 10 Hacking Group charged for compromising Intellectual Property and Confidential Business Information from government agencies NASA & other 45 US Tech giants.

Zhu and Zhang members from Chinese state sponsor APT group associated
with the Chinese Ministry of State Security involved with various cybercrime activities.

APT10 hacking group targeting mostly commercial activities including aviation, satellite and maritime technology, industrial factory automation, automotive supplies, laboratory instruments, banking and finance, telecommunications and consumer electronics, computer processor technology, information technology services.

- Advertisement - SIEM as a Service

Both are conducting various global campaigns of Cyber attack that target, among other data, intellectual property and confidential business and technological information at managed service providers.

This secret operation implemented against more than 45 technology companies in at least a dozen U.S. states, and U.S. government agencies.

Also Stolen various sensitive data from managed service providers (MSPs) and their government and commercial clients in at least 12 countries, including the UK, Brazil, Canada, Finland, France, Germany, India, Japan, Sweden, Switzerland, and the UAE, as well as the US

In order to perform an illegal hacking operation, both are registered IT infrastructure that the APT10 Group used.

The FBI said they had also hacked into US Navy computer systems and stolen the personal information of more than 100,000 personnel.

Deputy Attorney General Rosenstein said, “The indictment alleges that the defendants were part of a group that hacked computers in at least a dozen countries and gave China’s intelligence service access to sensitive business information,”

According to Department of Justice, “It is galling that American companies and government agencies spent years of research and countless dollars to develop their intellectual property, while the defendants simply stole it and got it for free” said, U.S. Attorney Berman.  “As a nation, we cannot, and will not, allow such brazen thievery to go unchecked.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Indian Cyber Crime Police Arrested Largest Tech Support Scam Operators in India With the Help of Microsoft

UK Teen Finally Arrested for DDoS Attack on ProtonMail Behalf of Russian Hackers Group

42-year-old man Arrested For Hacking More than 2,000 Computers From 50 countries With DarkComet RAT

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to...

145,000 ICS Systems, Thousands of HMIs Exposed to Cyber Attacks

Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new...