New Study Links Seemingly Disparate Malware Attacks to Chinese Hackers

Malware Attacks

Chinese cyber espionage group APT41 has been linked to seemingly disparate malware campaigns, according to fresh research that has mapped together additional parts of the group’s network infrastructure to hit upon a state-sponsored campaign that takes advantage of COVID-themed phishing lures to target victims in India.

“The image we uncovered was that of a state-sponsored campaign that plays on people’s hopes for a swift end to the pandemic as a lure to entrap its victims,” the BlackBerry Research and Intelligence team said in a report shared with The Hacker News. “And once on a user’s machine, the threat blends into the digital woodwork by using its own customized profile to hide its network traffic.”

APT41 (aka Barium or Winnti) is a moniker assigned to a prolific Chinese cyber threat group that carries out state-sponsored espionage activity in conjunction with financially motivated operations for personal gain as far back as 2012. Calling the group “Double Dragon,” citing its twin objectives, Mandiant (formerly FireEye) pointed out the collective’s penchant for striking healthcare, high-tech, and telecommunications sectors for establishing long-term access and facilitating…

http://feedproxy.google.com/~r/TheHackersNews/~3/wFMqRw3SpeE/new-study-links-seemingly-disparate.html

Leave a Reply

Your email address will not be published. Required fields are marked *