Wednesday, May 22, 2024

Google Says Chinese & Iranian Hackers Targeted Campaigns of Trump and Biden

Cybercriminals targeted the email accounts of President Donald Trump’s and Democrat Joe Biden campaign staffers, Google researchers said.

Google’s TAG who deals with nation-state hacking detected that Chinese state-backed hackers targeted the Email accounts of Biden campaign staffers whereas the Iranian hackers targeted the email accounts of Trump campaign staff.

Hackers Targeted Campaigns

Google’s threat analysis chief Shane Huntley said that “If you are working on a campaign this election cycle, your accounts may be targeted.”

Huntley also confirms that there was “no sign of compromise” of either campaign and recommend all users involved in campaigns to use the best protection like two-factor authentication or other Advanced Protection.

Google has notified the users of targeted and informed law enforcement agencies about the new attack campaign.

The groups involved in the attacks are APT31 and APT35. The APT31 group tied with the Chinese government and they share several attributes, tactics, and techniques.

APT35 backed by the Iranian government known for targeting the U.S. and the Middle Eastern military, diplomatic and government personnel, organizations in the media, energy, and defense industrial base (DIB), and engineering, business services, and telecommunications sectors.

“From candidates to canvassers, every member of a campaign should understand how to add extra layers of security and protect their information. We recommend everyone associated with political campaigns enroll in our Advanced Protection Program, which bundles all our strongest Google Account security options together.”

Google has not provided any details other than Huntley’s tweets, the tweets show the sign of how sensitive Americans have become to digital espionage efforts.

“We are aware of reports from Google that a foreign actor has made unsuccessful attempts to access the personal email accounts of campaign staff,” said the Biden campaign.

“We are vigilant about cybersecurity and do not discuss any of our precautions,” a Trump campaign spokesperson said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.


Latest articles

OmniVision Technologies Cyber Attack, Hackers Stolen Personal Data in Ransomware Attack

OmniVision Technologies, Inc. (OVT) recently disclosed a significant security breach that compromised its clients'...

Critical Flaw In Confluence Server Let Attackers Execute Arbitrary Code

The widely used team workspace corporate wiki Confluence has been discovered to have a...

Threat Actors Leverage Bitbucket Artifacts to Breach AWS Accounts

In a recent investigation into Amazon Web Services (AWS) security breaches, Mandiant uncovered a...

Hackers Breached Western Sydney University Microsoft 365 & Sharepoint Environments

Western Sydney University has informed approximately 7,500 individuals today of an unauthorized access incident...

Memcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From Digital Impersonation Fraud

Memcyco Inc., provider of digital trust technology designed to protect companies and their customers...

DoppelGänger Attack: Malware Routed Via News Websites And Social Media

A Russian influence campaign, DoppelGänger, leverages fake news websites (typosquatted and independent) to spread...

Critical Memory Corruption In Cloud Logging Infrastructure Enables Code Execution Attack

A new critical vulnerability has been discovered in Fluent Bit's built-in HTTP server, which...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles