Skip to main content

Attacks from Chinese hacking group have spiked, U.S. firm says

Attempted cyberattacks from a sophisticated Chinese hacking group have spiked since late January, according to cybersecurity firm FireEye Inc.

FireEye chief security architect Christopher Glyer said more than 75 of its customers were targeted in the attacks across more than a dozen countries, including the United States and Canada. The surge is “one of the broadest campaigns by a Chinese cyber espionage actor we have observed in recent years,” according to a post by FireEye on the cyberattacks.

“We haven’t seen something of this nature in at least three years,” Glyer told Digital Trends.

The group behind the attacks was identified as “APT41,” a China-based team made of contractors working on behalf of the Chinese government, Glyer said.

APT41 exploited flaws in Cisco and Citrix software to target firms across a variety of industries, including banking and finance, healthcare and construction firms.

The surge began on January 20 and lasted at least through March 11, with the group active as recently as this past week. Glyer said there could be numerous factors to explain the uptick in activity, such as the spread of coronavirus or the availability of a public exploit in the Cisco and Citrix software.

APT41, first flagged in 2012, is unique in that the hackers launched cyberattacks both to assist the Chinese government and for personal profit.

“There’s no other group that operates like that,” Glyer said.

In the past, APT41 has targeted telecommunications firms by planting malware that could effectively allow them to read individuals’ text messages or scan for keywords in text conversations, Glyer said.

“We’ve never seen any other group do that or have the sophistication to do that,” he said. “That’s incredibly rare.”

However, there isn’t evidence that the hacking group is using those methods during its recent spike in activity, he added.

It is the latest example of the spike in cyber crimes and attempted hacks that have been happening in and around the ongoing COVID-19 pandemic. With the added pressure of the virus and the change of routine for everyone, hackers are likely to take more advantage of people, security experts say. Already, reports have emerged of hackers posing as World Health Organization or Center for Disease Control officials in phishing attacks.

“From our perspective, we see these hacks all the time when there’s a vulnerability or data leak. The difference now is because of COVID-19 and coronavirus in the news, they [the hackers] are using it as part of their messaging,” said Dave Excell, the founder of Featurespace, a cybersecurity company that uses adaptive behavioral analytics to detect fraudulent activity.

The company works heavily in the financial sector, a space that’s seen a massive shift in the way people spend money, as everyone has moved inside and started using more credit cards online. “We’ve been as busy as ever with our customers, making sure they have the right defense in place as more people are going online to transact,” Excell told Digital Trends.

The World Economic Forum recently said that hackers are setting up fake coronavirus tracking websites and scraping the data from people who visited. In the U.K. victims lost more than 800,000 British pounds to a website promising to sell them protective face masks. Phishing attacks are on the rise, not in the least against the U.S. Department of Health and Human Services.

“If systems are already vulnerable, and the way of thinking is antiquated, and business and organizations don’t have proper protections in place to begin with, times like these will make us more vulnerable,” said Eric Bednash, CEO of RackTop Systems. “Whenever there’s a pandemic or a disaster, all of those things create added pressure, and extra opportunity for the bad guys.”

“Be extra diligent,” Bednash said, even as it might get harder to do so. “Everyone’s searching for ‘coronavirus tracker.’ Make sure you go to a reputable website. If you’re going to look up information on anything related to the pandemic, don’t click on links on your phone or computer that are not from well-known sources.”

Editors' Recommendations

Maya Shwayder
I'm a multimedia journalist currently based in New England. I previously worked for DW News/Deutsche Welle as an anchor and…
Huge digital waterfall wows travelers at Singapore’s Changi Airport
singapores changi airport unveils stunning digital features 1

Experience the magic of T2

Singapore’s Changi Airport won a prominent Best Airport award earlier this year, and that was even before it unveiled its dramatic revamp of Terminal 2.

Read more
GPT-4 Turbo is the biggest update since ChatGPT’s launch
A person typing on a laptop that is showing the ChatGPT generative AI website.

OpenAI has just unveiled the latest updates to its large language models (LLM) during its first developer conference, and the most notable improvement is the release of GPT-4 Turbo, which is currently entering preview. GPT-4 Turbo comes as an update to the existing GPT-4, bringing with it a greatly increased context window and access to much newer knowledge. Here's everything you need to know about GPT-4 Turbo.

OpenAI claims that the AI model will be more powerful while simultaneously being cheaper than its predecessors. Unlike the previous versions, it's been trained on information dating to April 2023. That's a hefty update on its own -- the latest version maxed out in September 2021. I just tested this myself, and indeed, using GPT-4 allows ChatGPT to draw information from events that happened up until April 2023, so that update is already live.

Read more
Robot crushes man to death after mistaking him for a box
A smart factory concept.

A robot crushed a man to death after apparently mistaking him for a box, South Korean media reported.

The tragedy occurred on Wednesday evening local time at a vegetable sorting facility in South Gyeongsang province about 150 miles south of Seoul, according to the BBC.

Read more