Monday, February 10, 2025
HomeCyber AttackGoogle Says Chinese & Iranian Hackers Targeted Campaigns of Trump and Biden

Google Says Chinese & Iranian Hackers Targeted Campaigns of Trump and Biden

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals targeted the email accounts of President Donald Trump’s and Democrat Joe Biden campaign staffers, Google researchers said.

Google’s TAG who deals with nation-state hacking detected that Chinese state-backed hackers targeted the Email accounts of Biden campaign staffers whereas the Iranian hackers targeted the email accounts of Trump campaign staff.

Hackers Targeted Campaigns

Google’s threat analysis chief Shane Huntley said that “If you are working on a campaign this election cycle, your accounts may be targeted.”

Huntley also confirms that there was “no sign of compromise” of either campaign and recommend all users involved in campaigns to use the best protection like two-factor authentication or other Advanced Protection.

Google has notified the users of targeted and informed law enforcement agencies about the new attack campaign.

The groups involved in the attacks are APT31 and APT35. The APT31 group tied with the Chinese government and they share several attributes, tactics, and techniques.

APT35 backed by the Iranian government known for targeting the U.S. and the Middle Eastern military, diplomatic and government personnel, organizations in the media, energy, and defense industrial base (DIB), and engineering, business services, and telecommunications sectors.

“From candidates to canvassers, every member of a campaign should understand how to add extra layers of security and protect their information. We recommend everyone associated with political campaigns enroll in our Advanced Protection Program, which bundles all our strongest Google Account security options together.”

Google has not provided any details other than Huntley’s tweets, the tweets show the sign of how sensitive Americans have become to digital espionage efforts.

“We are aware of reports from Google that a foreign actor has made unsuccessful attempts to access the personal email accounts of campaign staff,” said the Biden campaign.

“We are vigilant about cybersecurity and do not discuss any of our precautions,” a Trump campaign spokesperson said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

LLM Hijackers Exploit DeepSeek-V3 Model Just One Day After Launch

Hackers reportedly gained unauthorized access to the cutting-edge DeepSeek-V3 model within just 24 hours...

GitHub Copilot’s New Agent Mode Enables Autonomous Code Completion

GitHub has once again raised the bar for productivity in software development with the...

Marvel Game Vulnerability Exposes PCs & PS5s to Remote Takeover Attacks

A severe security vulnerability has been uncovered in the popular video game Marvel Rivals, raising...

Massive Brute Force Attack Launched With 2.8 Million IPs To Hack VPN & Firewall Logins

Massive brute force attacks targeting VPNs and firewalls have surged in recent weeks, with...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

New Scareware Attack Targeting Mobile Users to Deploy Malicious Antivirus Apps

A new wave of scareware attacks has emerged, targeting unsuspecting mobile users with fake...