The United States and international cybersecurity authorities are issuing this joint Cybersecurity Advisory (CSA) to highlight a recently discovered cluster of activity of interest associated with a People’s Republic of China (PRC) state-sponsored cyber actor, also known as Volt Typhoon. Private sector partners have identified that this activity affects networks across US critical infrastructure sectors, and the authoring agencies believe the actor could apply the same techniques against these
china (83)
Around the time that the US Federal Bureau of Investigation (FBI) was examining the equipment recovered from the wreckage of the Chinese spy balloon shot down off the South Carolina coast in February, American intelligence agencies and Microsoft detected what they feared was a more worrisome intruder: mysterious computer code that has been popping up in telecommunications systems in Guam and elsewhere in the US.
The code, which Microsoft said was installed by a Chinese government hacking group,
“There is nothing wrong with your television set. Do not attempt to adjust the picture. We are controlling transmission. If we wish to make it louder, we will bring up the volume. If we wish to make it softer, we will tune it to a whisper. We will control the horizontal. We will control the vertical. We can roll the image, make it flutter. We can change the focus to a soft blur, or sharpen it to crystal clarity. For the next hour, sit quietly and we will control all that you see and hear.
The current Ukraine crisis has revealed the willingness of state and non-state actors to involve themselves in conducting attacks of various degrees of severity and frequency. Notably, hacktivists and cybercriminal groups have joined the conflict extending beyond the borders of the two primary combatants, with cyberattacks targeting those governments and private sector organizations perceived to be supporting the other side. Patriotic hacktivism is not necessarily new, especially in troubled a
The Canadian military has discovered Chinese spy buoys in the Arctic which allegedly are monitoring US submarines and melting ice sheets. Such "activity is not new,” Canadian defense minister said in recent televised remarks, implying that China has been engaging in surveillance efforts in the region for some time.[1] Russia has long sought an Arctic trade route to create shorter vessel travel to Europe. Seems the Chinese may have the same idea, and oh; spy on its adversaries.
Officials descr
As space becomes the latest frontier for human dominance, satellites are becoming ever-important for life on Earth to function. There are currently 10,352 satellites orbiting the Earth of which 2317 were launched last year, according to the United Nations Office for Outer Space Affairs. But just like any other piece of complex technology, satellites can be hacked.
Last year, just before the Russian invasion of Ukraine, alleged Russian government hackers disabled communications in Ukraine by la
According to trusted government sources, there is an increasing focus on US Cyber Command (CYBERCOM) to try and replicate the ability of the US Special Operations Command (SOCOM), the unified combatant command with the mission of overseeing the elements of the special operations in the US Armed Services to bring capabilities directly into the battlespace. At a recent meeting, the chief of CYBEROM is quoted as saying that the command is “trying to build our authorities much in the same way Speci
US tech firms that have received federal funding in the past will be prevented from creating advanced technology factories in China for at least a decade. The Biden administration has announced new guidelines as part of a $53 Billion plan to build up the US national semiconductor industry. The “brain” in every electronic device, from cars to household appliances, is predominantly manufactured in Asia, notably in Taiwan's sophisticated and immensely costly fabrication plants.
The US Chips and S
The Uyghur community was targeted with an Android-based malware campaign for over seven years, according to researchers with cybersecurity firm Check Point. The last sample they found dated to the middle of August 2022. The Android spyware is called MobileOrder and has been used in various forms since 2015. “The scale and the persistence of the campaign is remarkable. Furthermore, the malware has a lot of active capabilities like calls and surround recording, real time geolocation and even th
A suspected cyber-attack on 7-Eleven stores, pervasive in large towns and at rail stations across Denmark, is reporting that “we cannot use cash registers and/or receive payments.” This the company wrote on its Facebook page. “We are therefore closed until we know the extent [of the attack]. We hope to be able to open stores again soon,” it wrote.
There are 176 7-Eleven stores in Denmark. The company’s CEO told a Danish broadcaster that cash registers “suddenly” began to malfunction in store
In light of all of the Russian ransomware attacks on organizations worldwide, a dose of Schadenfreude is a welcome sign. For our non-German readers: “Schadenfreude is the experience of pleasure, joy, or self-satisfaction that comes from learning of or witnessing the troubles, failures, or humiliation of another (especially an adversary). It is a borrowed word from German, with no direct translation, that originated in the 18th century.”
An unknown threat actor has been targeting Russian entitie
Chinese developers have created a new command-and-control (C2) framework with features and functionality similar to Cobalt Strike and Sliver. The new framework is called Manjusaka.
Cisco Talos researchers have discovered the C2 framework in the wild running in parallel with Cobalt strike. The initial investigation began with a Cisco Talos response to a Cobalt Strike beacon detection that was installed from a malicious Microsoft Word Document. The document was sent in an email as an attachment
From the Center for Security Policy: Over the past several years America has discovered that China has been carrying out various forms of espionage and intellectual property theft across the US, particularly targeting American companies in the tech sector. Just this past week it was reported that components from the Chinese tech conglomerate Huawei installed in US telecommunications networks could disrupt communications at US nuclear bases. While these companies set up American subsidiaries wh
A joint publication coauthored by the National Security Agency (NSA), Federal Bureau of Investigation (FBI) and the Cybersecurity & Infrastructure Security Agency (CISA) was released on 7 June 2022 about the People’s Republic of China State-Sponsored activities.
State-Sponsored actors have been exploiting Common Vulnerabilities and Exposures (CVEs) that are related to network devices. The vulnerabilities that these actors are exploiting are documented, and should be patched immediately if they
An elusive and sophisticated cyberespionage campaign orchestrated by the China-backed Winnti group has managed evade detection since at least 2019. Named by investigators "Operation CuckooBees,” the massive intellectual property theft operation enabled the threat actor to exfiltrate hundreds of gigabytes of information. Targets included technology and manufacturing companies primarily located in East Asia, Western Europe, and North America. "The attackers targeted intellectual property develo
Activity Summary - Week Ending on 8 April 2022:
- Red Sky Alliance identified 1,898 connections from new IP’s checking in with our Sinkholes
- Go Daddy LLC domain - 61 x
- Analysts identified 1,311 new IP addresses participating in various Botnets
- IcedID Trojan
- DoubleZero Wiper Malware
- ChronoPay
- Inverse Finance
- TX Infrastructure
- CN also attacking UA
Link to full report: IR-22-098-001_weekly098.pdf
The Winter Olympics have officially come to a close. There have been heartwarming headlines of athletes overcoming adversity, upsets, dominant performances, and countless clips of the mascot Bing Dwen Dwen throughout the past two weeks. The headline that cyber professionals are waiting for a yet to arrive.
In the weeks leading up to the opening of the Olympic Games athletes were required to install the My2022 app to track their health. The app is supposed to track Covid-19 and monitor the healt
US Department of Agriculture (USDA) analysts have reported that China, with less than 20% of the world's population has managed to stockpile more than half of the globe's corn and other grains, leading to steep price increases across the planet and dropping more countries into famine. COFCO Group, a major Chinese state-owned food processor, runs one of China's largest food stockpiling bases, at the port of Dalian, in the northeastern part of the country. It stores beans and grains gathered fr
Humanoid robot called “Jia Jia” was created by a team of engineers from the University of Science and Technology of China and was presented at a conference in Shanghai at the beginning of 2017. Jia Jia can hold a simple conversation and make specific facial expressions when asked, and her creator believes the eerily lifelike robot heralds a future of cyborg labor in China. This was five years ago and was billed as China’s first human-like robot. 2022 - The Brave New World is in full force.
Ji
Are hackers better at using AI than defenders? “There are three parts of any security strategy. You want to be able to detect, to prevent, and to respond,” says the Global Chief Technology Officer of Dell Technologies. “It turns out that in the 'detect' area, we are well underway. If you are using a security event information-management service or managed-security service provider, and they are not already using high degrees of advanced machine intelligence to detect threats, you already lost