China Hacked at Least 6 U.S. State Government Networks

Image for article titled China Hacked at Least 6 U.S. State Government Networks

Photo: katleho Seisa (Getty Images)

A prolific state-backed hacker group from China has penetrated the networks of at least six state governments in the U.S., new research from cybersecurity firm Mandiant reveals.

While we don’t know which state governments were affected by the hacking campaign, researchers say the group responsible is APT41—a well-known threat actor that has a long history of stirring up trouble. In this case, the group is said to have spent the last year exploiting a number of vulnerable platforms and programs to worm their way into public agencies. The intent of the hacking campaign is somewhat unclear, though APT41 is known for its cyber espionage capabilities.

In several cases, the hackers are said to have exploited an insecure farming app called USAHERDS—short for the Animal Health Emergency Reporting Diagnostic System—which is used by state governments to trace diseases in local livestock populations. USAHERDS, which is used by at least 18 different states, had a previously unknown zero-day vulnerability which allowed the hackers to compromise any server running the program. In other cases, APT41 exploited log4j, the unfortunate, widely-used open-source software program that was recently discovered to have major security flaws.

APT41, which also goes by the monikers “Barium” and “Winnti,” is thought to have been active since as far back as 2012. In addition to conducting espionage campaigns on behalf of the Chinese government, it is also known for its significant cybercrime operations. In 2020, five alleged members of the group were indicted in absentia by the U.S. Justice Department for a gargantuan hacking spree that involved intrusions into the networks of dozens of private companies and the theft of millions of dollars. The indictment further alleged the group was also involved in a diverse array of criminal activities, including crypto-jacking, ransomware, and the theft of all kinds of corporate proprietary information, including “source code, software code signing certificates, customer account data, and valuable business information.”

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts

Baidu’s CTO Wang Haifeng: PaddlePaddle Now Has 7.5 Million Developers

On July 6th, at the 2023 World Artificial Intelligence Conference, Wang Haifeng, Chief Technology Officer of Baidu. and Director of the National Engineering Research Center for Deep Learning Technology and Applications revealed that as of now, PaddlePaddle has attracted 7.5 million developers. This is also the first time Baidu has disclosed the latest data on
Read More
ByteDance Completes Acquisition of Oladance thumbnail

ByteDance Completes Acquisition of Oladance

ByteDance has recently completed the acquisition of Oladance, with existing shareholders including BA Capital and Lanchivc having exited. Back in May of this year, reports emerged that ByteDance had completed its acquisition of Oladance, with the acquisition price ranging between 300 million to 500 million yuan, and a team had been dispatched to the company.
Read More

A revamped wired Nest Doorbell is coming in 2022 with 24/7 video recording

Google is feeling the smart home heat. Shortly after Amazon announced its dirt-cheap $50 Blink video doorbell, Nest VP Rishi Chandra announced that Google also has a competing second-generation Nest Doorbell coming next year. And unlike the recently launched battery-powered Nest Doorbell, the new device will be hardwired like the original Nest Hello. That opens…
Read More
We tested for you: Acer Predator Triton 300 SE reviews thumbnail

We tested for you: Acer Predator Triton 300 SE reviews

14.01.2022 21:03 | Mobile Ovaj Acerov Predator Triton 300SE uopšte ne izgleda kao neki gejmerski laptop. 14” ekran, vizuelni elementi hromiranih lajsni, klasična pojava svetlo aluminijumskog kućišta, čitač otiska prsta. Jednom rečju, na prvi pogled ga je lako zameniti za neki biznis model. Međutim ako malo bolje zagledate, primetićete čuveni Predator logo, masivne bočne otvore…
Read More
Index Of News
Total
0
Share