Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2022-08-15 09:59:25 |
Chinese Cyberspies Use Supply Chain Attack to Deliver Windows, macOS Malware (lien direct) |
China-linked cyberespionage group Iron Tiger was observed using the compromised servers of a chat application for the delivery of malware to Windows and macOS systems, Trend Micro reports.
|
Malware
|
APT 27
|
|
 |
2022-07-20 08:37:31 |
Belgium Says Chinese APTs Targeted Interior, Defense Ministries (lien direct) |
Belgium on Monday accused Chinese state-sponsored hackers of launching cyberattacks against its interior and defense ministries.
Belgium noted in a statement that it has detected cyber intrusions from hacking groups tracked as APT27, APT30, APT31, and Gallium.
|
|
APT 30
APT 27
APT 31
|
|
 |
2021-08-03 04:00:51 |
DeadRinger: A Three-Pronged Attack by Chinese Military Actors against Major Telcos (lien direct) |
Researchers have discovered three separate Chinese military affiliated advanced threat groups simultaneously targeting and compromising the same Southeast Asian telcos. The attack groups concerned are Soft Cell, Naikon, and a third group, possibly Emissary Panda (also known as APT27).
|
Threat
|
APT 30
APT 27
|
|
 |
2021-01-05 04:59:54 |
Ransomware Attacks Linked to Chinese Cyberspies (lien direct) |
China-linked cyber-espionage group APT27 is believed to have orchestrated recent ransomware attacks, including one where a legitimate Windows tool was used to encrypt the victim's files.
|
Ransomware
Tool
|
APT 27
APT 27
|
|
 |
2019-05-29 15:23:01 |
Chinese Cyber-Spies Target Government Organizations in Middle East (lien direct) |
Chinese cyber-espionage group Emissary Panda has been targeting government organizations in two different countries in the Middle East, Palo Alto Networks security researchers say.
|
|
APT 27
|
|
 |
2019-03-01 12:10:00 |
China\'s APT27 Hackers Use Array of Tools in Recent Attacks (lien direct) |
Over the past two years, China-linked cyber-espionage group Emissary Panda has used an array of tools and intrusion methods in attacks on political, technology, manufacturing, and humanitarian organizations, Secureworks reports.
|
|
APT 27
|
|