Tuesday, March 5, 2024

Chinese Hackers from APT 10 Hacking Group Charged for a Cyber Attack on NASA

Two Chinese hackers who are behind the APT 10 Hacking Group charged for compromising Intellectual Property and Confidential Business Information from government agencies NASA & other 45 US Tech giants.

Zhu and Zhang members from Chinese state sponsor APT group associated
with the Chinese Ministry of State Security involved with various cybercrime activities.

APT10 hacking group targeting mostly commercial activities including aviation, satellite and maritime technology, industrial factory automation, automotive supplies, laboratory instruments, banking and finance, telecommunications and consumer electronics, computer processor technology, information technology services.

Both are conducting various global campaigns of Cyber attack that target, among other data, intellectual property and confidential business and technological information at managed service providers.

This secret operation implemented against more than 45 technology companies in at least a dozen U.S. states, and U.S. government agencies.

Also Stolen various sensitive data from managed service providers (MSPs) and their government and commercial clients in at least 12 countries, including the UK, Brazil, Canada, Finland, France, Germany, India, Japan, Sweden, Switzerland, and the UAE, as well as the US

In order to perform an illegal hacking operation, both are registered IT infrastructure that the APT10 Group used.

The FBI said they had also hacked into US Navy computer systems and stolen the personal information of more than 100,000 personnel.

Deputy Attorney General Rosenstein said, “The indictment alleges that the defendants were part of a group that hacked computers in at least a dozen countries and gave China’s intelligence service access to sensitive business information,”

According to Department of Justice, “It is galling that American companies and government agencies spent years of research and countless dollars to develop their intellectual property, while the defendants simply stole it and got it for free” said, U.S. Attorney Berman.  “As a nation, we cannot, and will not, allow such brazen thievery to go unchecked.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Indian Cyber Crime Police Arrested Largest Tech Support Scam Operators in India With the Help of Microsoft

UK Teen Finally Arrested for DDoS Attack on ProtonMail Behalf of Russian Hackers Group

42-year-old man Arrested For Hacking More than 2,000 Computers From 50 countries With DarkComet RAT

Website

Latest articles

GTPDOOR – Previously Unknown Linux Malware Attack Telecom Networks

Researchers have discovered a new backdoor named GTPDOOR that targets telecommunication network systems within...

US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp

Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019....

New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials  

Threat actors employ phishing scams to trick individuals into giving away important details like...

U.S. Charged Iranian Hacker, Rewards up to $10 Million

The United States Department of Justice (DoJ) has charged an Iranian national, Alireza Shafie...

Huge Surge in Ransomware-as-a-Service Attacks targeting Middle East & Africa

The Middle East and Africa (MEA) region has witnessed a surge in ransomware-as-a-service (RaaS)...

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers...

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles