Sunday, June 1, 2025
HomeCyber Security NewsCOVID-19 Research Organizations Attacked by Chinese Hackers Group

COVID-19 Research Organizations Attacked by Chinese Hackers Group

Published on

SIEM as a Service

Follow Us on Google News

FBI warned that Chinese hackers are attacking organizations who plays a vital role in research on COVID-19.

FBI and CISA have warned the organizations and multiple sectors includes state/local/tribal/territorial/private sectors and pharmaceutical and Health care departments.

Due to COVID-19 Pandemic, cyber-attacks are kept increasing and the attackers targeting various sectors via malspam, phishing related attacks.

- Advertisement - Google News

The currently ongoing attacks is investigating as a join operation lead by Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA)

“The attackers attempt to identify and illicitly obtain valuable intellectual property (IP) and public health data related to vaccines, treatments, and testing from networks and personnel affiliated with COVID-19-related research,” FBI, CISA said.

The Research teams have taken the responsibilities by investigating and working on them by maintaining Security and prevent them from threat, such as :

FBI has taken the accountability of defending the U.S. against foreign intelligence, spying, and other cyber operations duties.

CISA is contributing services and information to support the cybersecurity of federal and other sector entities that helps in COVID-19 research and response and they have also taken the accountability to save the nation’s crucial architecture from real cyber threats.

“The FBI and CISA urge all organizations conducting research in these areas to maintain dedicated cybersecurity and insider threat practices to prevent surreptitious review or theft of COVID-19-related material,” the PSA reads.

Preventive Measures :

  • Scan web applications for unwanted access, unusual task and mitigation.
  • Always use multi-factor authentication.
  • Recognize the malicious activity performed by end-users.
  • Always be take care of missing and poor encryption.
  • Upgrade end-to-end encryption.
  • Update Patches of all workstations and servers on time.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Latest articles

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...