Saturday, February 15, 2025
HomeCyber Security NewsCOVID-19 Research Organizations Attacked by Chinese Hackers Group

COVID-19 Research Organizations Attacked by Chinese Hackers Group

Published on

SIEM as a Service

Follow Us on Google News

FBI warned that Chinese hackers are attacking organizations who plays a vital role in research on COVID-19.

FBI and CISA have warned the organizations and multiple sectors includes state/local/tribal/territorial/private sectors and pharmaceutical and Health care departments.

Due to COVID-19 Pandemic, cyber-attacks are kept increasing and the attackers targeting various sectors via malspam, phishing related attacks.

The currently ongoing attacks is investigating as a join operation lead by Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA)

“The attackers attempt to identify and illicitly obtain valuable intellectual property (IP) and public health data related to vaccines, treatments, and testing from networks and personnel affiliated with COVID-19-related research,” FBI, CISA said.

The Research teams have taken the responsibilities by investigating and working on them by maintaining Security and prevent them from threat, such as :

FBI has taken the accountability of defending the U.S. against foreign intelligence, spying, and other cyber operations duties.

CISA is contributing services and information to support the cybersecurity of federal and other sector entities that helps in COVID-19 research and response and they have also taken the accountability to save the nation’s crucial architecture from real cyber threats.

“The FBI and CISA urge all organizations conducting research in these areas to maintain dedicated cybersecurity and insider threat practices to prevent surreptitious review or theft of COVID-19-related material,” the PSA reads.

Preventive Measures :

  • Scan web applications for unwanted access, unusual task and mitigation.
  • Always use multi-factor authentication.
  • Recognize the malicious activity performed by end-users.
  • Always be take care of missing and poor encryption.
  • Upgrade end-to-end encryption.
  • Update Patches of all workstations and servers on time.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Latest articles

Fake BSOD Attack Launched via Malicious Python Script

A peculiar malicious Python script has surfaced, employing an unusual and amusing anti-analysis trick...

SocGholish Malware Dropped from Hacked Web Pages using Weaponized ZIP Files

A recent wave of cyberattacks leveraging the SocGholish malware framework has been observed using...

Lazarus Group Targets Developers Worldwide with New Malware Tactic

North Korea's Lazarus Group, a state-sponsored cybercriminal organization, has launched a sophisticated global campaign...

North Korean IT Workers Penetrate Global Firms to Install System Backdoors

In a concerning escalation of cyber threats, North Korean IT operatives have infiltrated global...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Fake BSOD Attack Launched via Malicious Python Script

A peculiar malicious Python script has surfaced, employing an unusual and amusing anti-analysis trick...

SocGholish Malware Dropped from Hacked Web Pages using Weaponized ZIP Files

A recent wave of cyberattacks leveraging the SocGholish malware framework has been observed using...

Lazarus Group Targets Developers Worldwide with New Malware Tactic

North Korea's Lazarus Group, a state-sponsored cybercriminal organization, has launched a sophisticated global campaign...