Skip to main content

Attacks from Chinese hacking group have spiked, U.S. firm says

Attempted cyberattacks from a sophisticated Chinese hacking group have spiked since late January, according to cybersecurity firm FireEye Inc.

FireEye chief security architect Christopher Glyer said more than 75 of its customers were targeted in the attacks across more than a dozen countries, including the United States and Canada. The surge is “one of the broadest campaigns by a Chinese cyber espionage actor we have observed in recent years,” according to a post by FireEye on the cyberattacks.

“We haven’t seen something of this nature in at least three years,” Glyer told Digital Trends.

The group behind the attacks was identified as “APT41,” a China-based team made of contractors working on behalf of the Chinese government, Glyer said.

APT41 exploited flaws in Cisco and Citrix software to target firms across a variety of industries, including banking and finance, healthcare and construction firms.

The surge began on January 20 and lasted at least through March 11, with the group active as recently as this past week. Glyer said there could be numerous factors to explain the uptick in activity, such as the spread of coronavirus or the availability of a public exploit in the Cisco and Citrix software.

APT41, first flagged in 2012, is unique in that the hackers launched cyberattacks both to assist the Chinese government and for personal profit.

“There’s no other group that operates like that,” Glyer said.

In the past, APT41 has targeted telecommunications firms by planting malware that could effectively allow them to read individuals’ text messages or scan for keywords in text conversations, Glyer said.

“We’ve never seen any other group do that or have the sophistication to do that,” he said. “That’s incredibly rare.”

However, there isn’t evidence that the hacking group is using those methods during its recent spike in activity, he added.

It is the latest example of the spike in cyber crimes and attempted hacks that have been happening in and around the ongoing COVID-19 pandemic. With the added pressure of the virus and the change of routine for everyone, hackers are likely to take more advantage of people, security experts say. Already, reports have emerged of hackers posing as World Health Organization or Center for Disease Control officials in phishing attacks.

“From our perspective, we see these hacks all the time when there’s a vulnerability or data leak. The difference now is because of COVID-19 and coronavirus in the news, they [the hackers] are using it as part of their messaging,” said Dave Excell, the founder of Featurespace, a cybersecurity company that uses adaptive behavioral analytics to detect fraudulent activity.

The company works heavily in the financial sector, a space that’s seen a massive shift in the way people spend money, as everyone has moved inside and started using more credit cards online. “We’ve been as busy as ever with our customers, making sure they have the right defense in place as more people are going online to transact,” Excell told Digital Trends.

The World Economic Forum recently said that hackers are setting up fake coronavirus tracking websites and scraping the data from people who visited. In the U.K. victims lost more than 800,000 British pounds to a website promising to sell them protective face masks. Phishing attacks are on the rise, not in the least against the U.S. Department of Health and Human Services.

“If systems are already vulnerable, and the way of thinking is antiquated, and business and organizations don’t have proper protections in place to begin with, times like these will make us more vulnerable,” said Eric Bednash, CEO of RackTop Systems. “Whenever there’s a pandemic or a disaster, all of those things create added pressure, and extra opportunity for the bad guys.”

“Be extra diligent,” Bednash said, even as it might get harder to do so. “Everyone’s searching for ‘coronavirus tracker.’ Make sure you go to a reputable website. If you’re going to look up information on anything related to the pandemic, don’t click on links on your phone or computer that are not from well-known sources.”

Editors' Recommendations

Maya Shwayder
I'm a multimedia journalist currently based in New England. I previously worked for DW News/Deutsche Welle as an anchor and…
AMD makes older PCs more upgradeable once again
AMD Ryzen 7 7800X3D installed in a motherboard.

AMD's got plenty of top-notch processors in the Ryzen 7000 lineup, but it still hasn't given up on last-gen chips, as evidenced by its latest announcement. The company unveiled several new CPUs during an event in China, and while we'd largely expect AM5 chips at this point, we're also seeing the previously unannounced Ryzen 5000XT series. This is good news for those who are still using AM4 motherboards and want to upgrade, but the details are scarce right now.

A leaked slide, which comes from frequent hardware leaker HXL on X andwas showcased by AMD at the event, shows us a couple of new Ryzen 8000 CPUs alongside the Ryzen 5000XT. There are also mentions of CPUs that are already out on the market, such as the recently launched Ryzen 5 5600GT and Ryzen 5 5500GT, as well as older chips from the Ryzen 3000-series and the Athlon 3000G.

Read more
Microsoft just discovered the next big evolution in displays
Resident Evil 4 running on the LG UltraGear 45 gaming monitor.

Microsoft is working on a new patent that aims to bring unprecedented levels of control to displays. The new tech, dubbed Pixel Luminesce for Digital Display, allows you to micromanage every single pixel of your display, adjusting the brightness as needed. If and when this makes it out of the development stage, it could end up being huge for all sorts of use cases, and could bring major improvements to some of the best gaming monitors.

The patent application describing the tech, first shared by Windows Report, describes the new technology as something that would enable selective dimming. With Microsoft's new tech, you could decide that one part of the display stays brighter while the rest of it remains unaffected, and this would happen dynamically.

Read more
SWAT team’s Spot robot shot multiple times during standoff
Spot, a robot dog.

A Boston Dynamics’ Spot robot deployed by the Massachusetts State Police (MSP) was shot during a standoff in Cape Cod, Massachusetts.

It’s believed to be the first time that the robot helper has taken a bullet during active duty, and it highlights how the machine can help keep law enforcement out of harm’s way during challenging situations.

Read more