Tag: china
-
Chinese Hackers Use ‘BRICKSTORM’ Backdoor to Breach US Firms
The hackers are likely trying to collect data to feed the development of zero-day exploits, said Google researchers First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/chinese-hackers-brickstorm/
-
China-Linked Hackers Hit US Tech Firms with BRICKSTORM Malware
China-backed UNC5221 targets US legal and tech firms by deploying BRICKSTORM malware on neglected VMware and Linux/BSD appliances, Google’s Mandiant reports. First seen on hackread.com Jump to article: hackread.com/china-hackers-hit-us-tech-firms-brickstorm-malware/
-
Chinese State-Sponsored Hackers Targeting Telecommunications Infrastructure to Steal Sensitive Data
Tags: china, communications, cyber, data, espionage, exploit, group, hacker, infrastructure, intelligence, network, threatChinese state-sponsored cyber threat group Salt Typhoon has intensified long-term espionage operations against global telecommunications infrastructure, according to recent legal and intelligence reporting. Aligned with the Ministry of State Security (MSS) and active since at least 2019, Salt Typhoon has systematically exploited network edge devices to establish deep persistence and exfiltrate highly sensitive communications metadata,…
-
Cisco Uncovers New PlugX Backdoor Linked to Chinese APTs
The post Cisco Uncovers New PlugX Backdoor Linked to Chinese APTs appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/cisco-uncovers-new-plugx-backdoor-linked-to-chinese-apts/
-
SEO Poisoning Campaign Tied to Chinese Actor
In Operation Rewrite, an unspecified actor is using legitimate compromised web servers to deliver malicious content to visitors for financial gain. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/seo-poisoning-campaign-chinese-actor
-
Gains and Risks for Enterprises With DeepSeek V3.1
Splx Says Hardened Prompts Lower Hallucinations But Security Gaps Persist. DeepSeek is touting its newest model as its entry into the agent era and performance benchmarks show a notable leap in capabilities. Security testing shows progress and persistent vulnerabilities in the Chinese company’s upgraded V3.1 model. The raw model swore in response to testing prompts.…
-
Oracle gets to store US users’ TikTok data, says Trump
President to announce details on Big Red’s storage and security deal for Chinese social media phenomenon later this week First seen on theregister.com Jump to article: www.theregister.com/2025/09/23/oracle_gets_to_store_us/
-
BadIIS Malware Spreads via SEO Poisoning, Redirects Traffic, Plants Web Shells
Cybersecurity researchers are calling attention to a search engine optimization (SEO) poisoning campaign likely undertaken by a Chinese-speaking threat actor using a malware called BadIIS in attacks targeting East and Southeast Asia, particularly with a focus on Vietnam.The activity, dubbed Operation Rewrite, is being tracked by Palo Alto Networks Unit 42 under the moniker CL-UNK-1037,…
-
Details About Chinese Surveillance and Propaganda Companies
Tags: business, china, data-breach, firewall, government, infrastructure, startup, strategy, technologyDetails from leaked documents: While people often look at China’s Great Firewall as a single, all-powerful government system unique to China, the actual process of developing and maintaining it works the same way as surveillance technology in the West. Geedge collaborates with academic institutions on research and development, adapts its business strategy to fit different…
-
Pentagon Bans China-Based Engineers Over Hacking Concerns
The Pentagon bans China-based staff from cloud work after reports warn of espionage risks and urge tighter supply chain security. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/pentagon-bans-china-based-engineers-over-hacking-concerns/
-
A Dangerous Worm Is Eating Its Way Through Software Packages
Plus: An investigation reveals how US tech companies reportedly helped build China’s sweeping surveillance state, and two more alleged members of the Scattered Spider hacking group were arrested. First seen on wired.com Jump to article: www.wired.com/story/a-dangerous-worm-is-eating-its-way-through-software-packages/
-
Security News This Week: A Dangerous Worm Is Eating Its Way Through Software Packages
Plus: An investigation reveals how US tech companies reportedly helped build China’s sweeping surveillance state, and two more alleged members of the Scattered Spider hacking group were arrested. First seen on wired.com Jump to article: www.wired.com/story/a-dangerous-worm-is-eating-its-way-through-software-packages/
-
Inside the Jaguar Land Rover hack: stalled smart factories, outsourced cybersecurity and supply chain woes
Being a carmaker where ‘everything is connected’ has left JLR unable to isolate its plants or functions, forcing a shutdown of most systemsThe first external signs of the chaos about to hit JLR, Britain’s largest automotive employer, came on the quiet last Sunday of August. Managers at a factory in Halewood, Merseyside, told industry contacts…
-
Chinese Network Selling Thousands of Fake US and Canadian IDs
New investigation exposes a China-based ring that sold over 6,500 fake United States and Canadian IDs using well-planned covert packaging. Learn how this operation threatens national security and enables financial crime. First seen on hackread.com Jump to article: hackread.com/chinese-network-ofake-us-canadian-ids/
-
The GoLaxy papers: Inside China’s AI persona army
A cache of leaked documents from the Beijing-based company called GoLaxy lays out a chilling new approach to information warfare: an army of AI personas, engineered to look like us, think like us, and win our trust. First seen on therecord.media Jump to article: therecord.media/golaxy-china-artificial-intelligence-papers
-
The GoLaxy papers: Inside China’s AI persona army
A cache of leaked documents from the Beijing-based company called GoLaxy lays out a chilling new approach to information warfare: an army of AI personas, engineered to look like us, think like us, and win our trust. First seen on therecord.media Jump to article: therecord.media/golaxy-china-artificial-intelligence-papers
-
Russland und China nehmen deutsche Wirtschaft ins Visier
Laut einer Bitkom-Umfrage kommen die meisten Cyberangriffe auf Unternehmen hierzulande noch immer aus Russland und China.Knapp drei von vier Unternehmen hierzulande berichten von zunehmenden Angriffen analog und digital. Der Schaden wird auf rund 289 Milliarden Euro geschätzt. Das geht aus einer repräsentativen Befragung von mehr als 1.000 Unternehmen unterschiedlicher Branchen durch den Digitalverband Bitkom hervor. Demnach…
-
Schaden durch Datendiebstahl, Industriespionage und Sabotage steigt auf 289 Milliarden Euro
Schaden steigt auf 289 Milliarden Euro. Die Spur führt öfter nach Osten und zu ausländischen Geheimdiensten. Russland und China nehmen deutsche Wirtschaft ins Visier. Cyberattacken: Knapp drei von vier Unternehmen registrieren Zunahme von Angriffen. Jedes dritte Unternehmen hat nach Ransomware-Attacken Lösegeld gezahlt. Angriffe auf die deutsche Wirtschaft haben in den vergangenen zwölf Monaten weiter… First seen…
-
Schaden durch Datendiebstahl, Industriespionage und Sabotage steigt auf 289 Milliarden Euro
Schaden steigt auf 289 Milliarden Euro. Die Spur führt öfter nach Osten und zu ausländischen Geheimdiensten. Russland und China nehmen deutsche Wirtschaft ins Visier. Cyberattacken: Knapp drei von vier Unternehmen registrieren Zunahme von Angriffen. Jedes dritte Unternehmen hat nach Ransomware-Attacken Lösegeld gezahlt. Angriffe auf die deutsche Wirtschaft haben in den vergangenen zwölf Monaten weiter… First seen…
-
Breach Roundup: Microsoft, Cloudflare Dismantle RaccoonO365
Tags: ai, breach, china, data, data-breach, hacker, microsoft, phishing, privacy, service, spear-phishing, technologyAlso, Colt Services Outage Persists, Finland Charges Americans in Vastaamo Hack. This week, Microsoft hit RaccoonO365, Colt Technology Services, Finland charged a U.S. citizen in Vastaamo hack. RevengeHotels hackers used AI, Meta can’t overturn a privacy case verdict. Chinese hackers unleashed spear phishing emails. Prosper confirmed a data breach, as did Kering fashion houses. First…
-
Panda-monium: China-backed cyber crew spoof Congressman to dig for dirt on US trade talks
Proofpoint spots efforts to spy on US economic policy nerds First seen on theregister.com Jump to article: www.theregister.com/2025/09/18/pandamonium_chinabacked_attackers_spoof_congressman/
-
The Silent Spy: How Chinese Hackers are Exploiting U.S.-China Policy
The post The Silent Spy: How Chinese Hackers are Exploiting U.S.-China Policy appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/the-silent-spy-how-chinese-hackers-are-exploiting-u-s-china-policy/
-
China-linked APT41 targets government, think tanks, and academics tied to US-China trade and policy
China-linked group APT41 impersonated a U.S. lawmaker in phishing attacks on government, think tanks, and academics tied to US-China trade and policy. Proofpoint observed China-linked cyber espionage group APT41 impersonating a U.S. lawmaker in a phishing campaign targeting government, think tanks, and academics tied to U.S.-China trade and policy. APT41, known also as Amoeba, BARIUM,…
-
Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts
A China-aligned threat actor known as TA415 has been attributed to spear-phishing campaigns targeting the U.S. government, think tanks, and academic organizations utilizing U.S.-China economic-themed lures.”In this activity, the group masqueraded as the current Chair of the Select Committee on Strategic Competition between the United States and the Chinese Communist Party (CCP), as well as…
-
China-Aligned TA415 Exploits Google Sheets Calendar for C2
China-aligned TA415 hackers have adopted Google Sheets and Google Calendar as covert command-and-control (C2) channels in a sustained espionage campaign targeting U.S. government, academic, and think tank entities. By blending malicious operations into trusted cloud services, TA415 aims to evade detection and harvest intelligence on evolving U.S.China economic policy discussions. Throughout July and August 2025,…
-
China-Aligned TA415 Exploits Google Sheets Calendar for C2
China-aligned TA415 hackers have adopted Google Sheets and Google Calendar as covert command-and-control (C2) channels in a sustained espionage campaign targeting U.S. government, academic, and think tank entities. By blending malicious operations into trusted cloud services, TA415 aims to evade detection and harvest intelligence on evolving U.S.China economic policy discussions. Throughout July and August 2025,…
-
Chinese-Made Villager AI Pentest Tool Raises Cobalt Strike-Like Concerns
Villager is being pitched as a legitimate AI-powered pentest tool for red teams, but the platform, made by Chinese company Cyberspike, has been loaded almost 11,000 times on PyPI in two months, raising concerns that it is on the same path as Cobalt Strike, another red team tool that became a favorite of malicious actors.…
-
Chinese AI Villager Pen Testing Tool Hits 11,000 PyPI Downloads
AI-native Villager, which automates Kali and DeepSeek penetration tests, has reached 11,000 PyPI downloads fueling dual-use threat First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/chinese-ai-villager-pen-testing/
-
China slaps 1-hour deadline on reporting serious cyber incidents
Cyberspace watchdog tightens reporting regime, leaving little time to hide incidents First seen on theregister.com Jump to article: www.theregister.com/2025/09/16/china_1hour_cyber_reporting/

