Close Menu
Innovation Village | Technology, Product Reviews, Business
    Facebook X (Twitter) Instagram
    Wednesday, May 28
    • About us
      • Authors
    • Contact us
    • Privacy policy
    • Terms of use
    • Advertise
    • Newsletter
    • Post a Job
    • Partners
    Facebook X (Twitter) LinkedIn YouTube WhatsApp
    Innovation Village | Technology, Product Reviews, Business
    • Home
    • Innovation
      • Products
      • Technology
      • Internet of Things
    • Business
      • Agritech
      • Fintech
      • Healthtech
      • Investments
        • Cryptocurrency
      • People
      • Startups
      • Women In Tech
    • Media
      • Entertainment
      • Gaming
    • Reviews
      • Gadgets
      • Apps
      • How To
    • Giveaways
    • Jobs
    Innovation Village | Technology, Product Reviews, Business
    You are at:Home»Cybercrime»FireEye Points Fingers at Chinese Hackers for Compromising Government Agencies, Defense Contractors
    Hacker

    FireEye Points Fingers at Chinese Hackers for Compromising Government Agencies, Defense Contractors

    0
    By Tapiwa Matthew Mutisi on April 21, 2021 Cybercrime, Cybersecurity, Government, Report, Security, Software

    According to a prominent private cybersecurity firm FireEye which is working with the federal government; state-backed Chinese hackers are believed to have compromised dozens of E.U and U.S. government agencies, defense contractors, financial institutions, and other critical sectors. The FireEye security company said, the intrusions are ongoing and are the latest in a series of disturbing compromises of government agencies and private companies.

    The investigation is in its early stages but already has turned up evidence that the intruders breached sensitive defense companies according to FireEye. That was not the case with the Russian SolarWinds campaign, which compromised nine federal agencies but not the Pentagon or its contractors, U.S. officials said. And the recent discovery of a separate Chinese operation targeting Microsoft Exchange email servers — one that affected potentially more than 100,000 private-sector companies — did not hit U.S. government agencies.

    The More we Learn About the SolarWinds Hack, the Worse it Looks

    The Defense Department is not known to have been compromised in the current campaign, but the investigation is still ongoing, said one U.S. official who spoke on the condition of anonymity because of the matter’s sensitivity. Charles Carmakal, Chief Technology Officer of Mandiant, a division of FireEye reiterated that the hacking group involved was “very advanced” in its steps to evade detection. The campaign was targeted, focusing on high-value victims with information of value to the Chinese government. “This looks like classic China-based espionage. There was theft of intellectual property, project data. We suspect there was data theft that occurred that we won’t ever know about.”

    The Chinese group, sometimes known as APT5, has in the past victimized defense contractors, telecommunications companies, and other critical sectors, he said. FireEye also detected a second group involved in the hacking operation but could not tell whether that one was based in China or had government links, Carmakal said. The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) acknowledged in an alert Tuesday that the agency was aware of “ongoing exploitation” of software flaws in servers at “U.S. government agencies, critical infrastructure entities, and private sector organizations.”

    CISA and FireEye said that the flaws were in Pulse Secure virtual private network servers that enable employees to remotely access their company networks. CISA urged organizations using Pulse Secure to update to the latest software version and run a tool provided by the company to check for compromises. It also ordered all civilian agencies to do so by Friday. Pulse Secure, which is now owned by Ivanti, issued a statement Tuesday saying that a “limited number” of customers were affected. “The team worked quickly to provide mitigations directly” to the affected customers, it said.

    A White House spokesperson said Wednesday: ‘’CISA is actively managing this incident and we are monitoring the situation closely.” CISA said the hacks began in June or earlier. FireEye has evidence of intrusions dating to the summer but suspects they took place “well before that,” Carmakal said. “We’re just limited to the forensic data available to us.” The company first detected the private-sector intrusions earlier this year and notified the government “a few weeks ago,” he said. The hackers took advantage of a critical “zero-day,” or previously unknown vulnerability in Pulse Secure, he said.

    Microsoft Blames China for Global E-mail Servers, Microsoft Exchange Hack

    At least a dozen U.S. government agencies have or recently had contracts for the popular software, according to a Washington Post review. The hackers were able to disguise their activity, CISA said, by using hacked devices such as Internet routers in the vicinity of their victims’ locations. Most were in the United States, but some were in Europe, Carmakal said. They also disguised themselves by renaming their systems to masquerade as employees whose computers they hacked, he said.

    There was far more concern about the Microsoft Exchange hack — U.S. national security adviser Jake Sullivan even tweeted out an alert urging organizations using the servers to patch “ASAP.” That was because the campaign was far more indiscriminate, affecting potentially any organization or business that ran the Exchange servers to host non-cloud email. The alarms moved enough organizations to patch their systems that the widespread damage some feared might result from the campaign has so far been avoided.

    Related

    Chinese government Cyber attack cybercrime Data Protection FireEye Hackers Information technology Security software
    Share. Facebook Twitter Pinterest LinkedIn Email
    Tapiwa Matthew Mutisi
    • Facebook
    • X (Twitter)
    • LinkedIn

    Tapiwa Matthew Mutisi has been covering blockchain technology, intelligent technologies, cryptocurrency, cybersecurity, telecommunications technology, sustainability, autonomous vehicles, and other topics for Innovation Village since 2017. In the years since, he has published over 4,000 articles — a mix of breaking news, reviews, helpful how-tos, industry analysis, and more. | Open DM on Twitter @TapiwaMutisi

    Related Posts

    Airtel Flags Over 9.6 Million Spam Messages with AI-Powered Alert System

    Gemini Expands Across Android Devices: Watches, Cars, TVs, and XR

    Android Boosts Safety with Smarter Scams Protection and Find Hub

    Leave A Reply Cancel Reply

    You must be logged in to post a comment.

    Copyright ©, 2013-2024 Innovation-Village.com. All Rights Reserved

    Type above and press Enter to search. Press Esc to cancel.