Thursday, February 27, 2025
HomeComputer SecurityChinese Hackers from APT 10 Hacking Group Charged for a Cyber Attack...

Chinese Hackers from APT 10 Hacking Group Charged for a Cyber Attack on NASA

Published on

SIEM as a Service

Follow Us on Google News

Two Chinese hackers who are behind the APT 10 Hacking Group charged for compromising Intellectual Property and Confidential Business Information from government agencies NASA & other 45 US Tech giants.

Zhu and Zhang members from Chinese state sponsor APT group associated
with the Chinese Ministry of State Security involved with various cybercrime activities.

APT10 hacking group targeting mostly commercial activities including aviation, satellite and maritime technology, industrial factory automation, automotive supplies, laboratory instruments, banking and finance, telecommunications and consumer electronics, computer processor technology, information technology services.

Both are conducting various global campaigns of Cyber attack that target, among other data, intellectual property and confidential business and technological information at managed service providers.

This secret operation implemented against more than 45 technology companies in at least a dozen U.S. states, and U.S. government agencies.

Also Stolen various sensitive data from managed service providers (MSPs) and their government and commercial clients in at least 12 countries, including the UK, Brazil, Canada, Finland, France, Germany, India, Japan, Sweden, Switzerland, and the UAE, as well as the US

In order to perform an illegal hacking operation, both are registered IT infrastructure that the APT10 Group used.

The FBI said they had also hacked into US Navy computer systems and stolen the personal information of more than 100,000 personnel.

Deputy Attorney General Rosenstein said, “The indictment alleges that the defendants were part of a group that hacked computers in at least a dozen countries and gave China’s intelligence service access to sensitive business information,”

According to Department of Justice, “It is galling that American companies and government agencies spent years of research and countless dollars to develop their intellectual property, while the defendants simply stole it and got it for free” said, U.S. Attorney Berman.  “As a nation, we cannot, and will not, allow such brazen thievery to go unchecked.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Indian Cyber Crime Police Arrested Largest Tech Support Scam Operators in India With the Help of Microsoft

UK Teen Finally Arrested for DDoS Attack on ProtonMail Behalf of Russian Hackers Group

42-year-old man Arrested For Hacking More than 2,000 Computers From 50 countries With DarkComet RAT

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google’s SafetyCore App Secretly Scans All Photos on Android Devices

Recent revelations about Google’s SafetyCore app have ignited a firestorm of privacy debates, echoing...

New “nRootTag” Attack Turns 1.5 Billion iPhones into Free Tracking Tools

Security researchers have uncovered a novel Bluetooth tracking vulnerability in Apple’s Find My network...

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Researchers Uncover $1.4B in Sensitive Data Tied to ByBit Hack by Lazarus Group

In a significant breakthrough, cybersecurity firm Silent Push has uncovered sensitive infrastructure tied to...

Genea IVF Clinic Cyberattack Threatens Thousands of Patient Records

A significant cybersecurity breach at Genea, one of Australia’s largest in vitro fertilization (IVF)...

2,850+ Ivanti Connect Secure Devices Exposed to Potential Cyberattacks

A sweeping cybersecurity alert has emerged as researchers identify 2,850+ unpatched Ivanti Connect Secure devices worldwide,...