Remove 2009 Remove Government Remove Healthcare Remove Security
article thumbnail

North Korea-linked Lazarus APT targets the COVID-19 research

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. The attacks aimed at a Ministry of Health and a pharmaceutical company involved in the development of the COVID-19 vaccine.

article thumbnail

China-linked APT10 leverages ZeroLogon exploits in recent attacks

Security Affairs

The group, also known as Cicada, Stone Panda , and Cloud Hopper , has been active at least since 2009, in April 2017 experts from PwC UK and BAE Systems uncovered a widespread hacking campaign, tracked as Operation Cloud Hopper , targeting managed service providers (MSPs) in multiple countries worldwide. ” Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US DoJ indicts Chinese hackers over state-sponsored cyber espionage

Security Affairs

The US Department of Justice charged two Chinese hackers for hacking numerous companies and government agencies in a dozen countries, US Indicts Two Chinese Government Hackers Over Global Hacking Campaign. The post US DoJ indicts Chinese hackers over state-sponsored cyber espionage appeared first on Security Affairs.

article thumbnail

US DoJ charged two Chinese hackers working with MSS

Security Affairs

US DoJ charged two Chinese hackers working with China’s Ministry of State Security with hacking into computer systems of government organizations and companies worldwide. ” reads the press release published by the DoJ. ” reads the press release published by the DoJ. ” continues the DoJ.