article thumbnail

New Leak Shows Business Side of China’s APT Menace

Krebs on Security

Although the cache does not include raw data stolen from cyber espionage targets, it features numerous documents listing the level of access gained and the types of data exposed in each intrusion. Danowski said that in 2013, i-SOON established a department for research on developing new APT network penetration methods. .”