Thursday, July 18, 2024
EHA

COVID-19 Research Organizations Attacked by Chinese Hackers Group

FBI warned that Chinese hackers are attacking organizations who plays a vital role in research on COVID-19.

FBI and CISA have warned the organizations and multiple sectors includes state/local/tribal/territorial/private sectors and pharmaceutical and Health care departments.

Due to COVID-19 Pandemic, cyber-attacks are kept increasing and the attackers targeting various sectors via malspam, phishing related attacks.

The currently ongoing attacks is investigating as a join operation lead by Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA)

“The attackers attempt to identify and illicitly obtain valuable intellectual property (IP) and public health data related to vaccines, treatments, and testing from networks and personnel affiliated with COVID-19-related research,” FBI, CISA said.

The Research teams have taken the responsibilities by investigating and working on them by maintaining Security and prevent them from threat, such as :

FBI has taken the accountability of defending the U.S. against foreign intelligence, spying, and other cyber operations duties.

CISA is contributing services and information to support the cybersecurity of federal and other sector entities that helps in COVID-19 research and response and they have also taken the accountability to save the nation’s crucial architecture from real cyber threats.

“The FBI and CISA urge all organizations conducting research in these areas to maintain dedicated cybersecurity and insider threat practices to prevent surreptitious review or theft of COVID-19-related material,” the PSA reads.

Preventive Measures :

  • Scan web applications for unwanted access, unusual task and mitigation.
  • Always use multi-factor authentication.
  • Recognize the malicious activity performed by end-users.
  • Always be take care of missing and poor encryption.
  • Upgrade end-to-end encryption.
  • Update Patches of all workstations and servers on time.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...

Cybercriminals Exploit Attack on Donald Trump for Crypto Scams

Researchers at Bitdefender Labs remain ever-vigilant, informing users about the latest scams and internet...

New TE.0 HTTP Request Smuggling Flaw Impacts Google Cloud Websites

HTTP Request Smuggling is a flaw in web security that is derived from variations...

Volcano Demon Group Attacking Organizations With LukaLocker Ransomware

The Volcano Demon group has been discovered spreading a new ransomware called LukaLocker, which...

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles