www.cybersecurityintelligence.com Open in urlscan Pro
185.3.164.66  Public Scan

Submitted URL: https://t.co/r3V9Lh5RPM
Effective URL: https://www.cybersecurityintelligence.com/blog/phishing-attack-on-us-government-linked-to-chinese-hackers--6183.html
Submission: On March 23 via api from GB — Scanned from GB

Form analysis 1 forms found in the DOM

GET https://www.cybersecurityintelligence.com/blog.php

<form class="headersearchbox centreall" action="https://www.cybersecurityintelligence.com/blog.php" method="get">
  <input id="keywords" name="keywords" placeholder="Search News" value="" type="text">
  <button id="submit" class="btn btn-default " name="submit" type="submit"><img src="https://www.cybersecurityintelligence.com/template/cseci2018_child/images/search.png"></button>
</form>

Text Content

Menu
 * NEWS ►
   * News Analysis
   * Newsletter Archive
 * BUSINESS ►
   * Production
   * Energy
   * Manufacturing
   * Utilities
   * Services
   * Consulting
   * Financial
   * Health & Welfare
   * IT & Telecoms
   * Law
   * Transport & Travel
 * GOVERNMENT ►
   * Defence
   * Law Enforcement
   * Local
   * National
 * TECHNOLOGY ►
   * 
   * Developments
   * Hackers
   * Resilience
   * Key Areas
   * 5G Networks
   * Artificial Intelligence
   * Blockchain
   * Internet of Things
   * Social Media
 * INTELLIGENCE ►
   * 
   * Europe
   * International
   * USA
   * Hot Spots
   * China
   * Iran
   * North Korea
   * Russia
 * JOBS ►
   * Careers
   * Education & Training
 * DIRECTORY ►
   * Browse Categories
   * Browse Locations
   * Advanced Search
 * SUBSCRIBER AREA ►
   * My Account
   * Directors Reports


Subscribe Login
 
FBI advised that hackers scanned networks of 5 US energy firms ahead of Biden's
Russia cyberattack warning | CNN https://t.co/OLXqej8GSV
~ The Lessons Learned From Log4j: Open Source Software Has Its Drawbacks: When
threats arise, some software support... https://t.co/14bmYCWD5w
~ Zero Trust In The Boardroom: Cyber Security Is A Top Priority For Business
Leaders: Reasons why CEOs need to hav... https://t.co/EMqXZWUfXU
~ Twitter Joins Ukraine's War Effort: Twitter has been a powerful weapon in many
conflicts, used to spread propagan... https://t.co/RphQA0T9kI
Pandora Ransomware Hits Giant Automotive Supplier Denso | Threatpost
https://t.co/QyWKGLYGUb
~ The App At The Frontline Of Information Warfare: Telegram enables Russian
citizens to access first-hand informati... https://t.co/OMnE5XHpLB
~ US Moves Cyber Defences To High Alert: Americans should �lock their digital
doors' to prepare for a Russian cyber... https://t.co/3I7untiru1
Find Your Ideal Cyber Security Job: If you're looking for a rewarding career,
cyber security might be your ideal ch... https://t.co/4C9KpmNKev
- FREE ACCES TO OUR CYBER SECURITY SUPPLIER DIRECTORY: Cyber Security Supplier
Directory - Are You Listed? - 6,000-... https://t.co/iOT8xR1NJ5
~ Top Tips On How To Improve Cyber Security Visibility & Control: Your cyber
security strategy needs the right too... https://t.co/HzNr7vUeZh
~ In Britain 'Cyberflashing' Is Now A Crime: Sending unsolicited sexual images
via social media, dating apps, as we... https://t.co/m2wqtQrGTN
~ Energy Convergence & Digitalisation Create Problems For Energy Utilities: The
convergence of previously separate... https://t.co/xymN7dBvdB
~ Cyber Innovation And Industry 4.0: The world is changing technologically
faster than ever before, creating new i... https://t.co/GF1MopEz9a
~Sign Up for our FREE Weekly Newsletter https://t.co/dPWJbyGncZ #cybersecurity
https://t.co/yJp8w3vuWj
~ Twitter Joins Ukraine's War Effort: Twitter has been a powerful weapon in many
conflicts, used to spread propagan... https://t.co/w1EVxMOzRi
- The Online War in Ukraine: As events in Ukraine move quickly, it has become
clear that this is the first armed co... https://t.co/Y5CgrTZTRw
~ The US Military Want 5G Fast: Military communications need the rapid transfer
of large quantities of data that 5G... https://t.co/kmAFw6aQ7S
~ Get The Best Cyber Security Audits & Training: Organisations often invest
heavily in cyber security technology, b... https://t.co/WEE5JDM1RI
~ Most SMEs Do Not Provide Cyber Security Training: A study reveals that 62% of
SMEs have experienced a cyber attac... https://t.co/mTGzGBHod0
~ Ukraine's 'IT Army' Risks Being Hijacked By Malware: A malware campaign is
exploiting people's willingness to sup... https://t.co/ttSGKLzlDp


 * HOME
 * NEWS
   * News Analysis
   * Newsletter Archive
 * BUSINESS
   * Production
   * Energy
   * Manufacturing
   * Utilities
   * Services
   * Consulting
   * Financial
   * Health & Welfare
   * IT & Telecoms
   * Law
   * Transport & Travel
 * GOVERNMENT
   * Defence
   * Law Enforcement
   * Local
   * National
 * TECHNOLOGY
   * 
   * Developments
   * Hackers
   * Resilience
   * Key Areas
   * 5G Networks
   * Artificial Intelligence
   * Blockchain
   * Internet of Things
   * Social Media
 * INTELLIGENCE
   * 
   * Europe
   * International
   * USA
   * Hot Spots
   * China
   * Iran
   * North Korea
   * Russia
 * JOBS
   * Careers
   * Education & Training
 * DIRECTORY
   * Browse Categories
   * Browse Locations
   * Advanced Search
 * SUBSCRIBER AREA
   * My Account
   * Directors Reports
 * ABOUT
   * Who We Are
   * Contact
   * Commercial Terms


PHISHING ATTACK ON US GOVERNMENT LINKED TO CHINESE HACKERS

Uploaded on 2022-03-22 in TECHNOLOGY--Hackers, GOVERNMENT-National, FREE TO VIEW




Share


Two separate Chinese state-sponsored Advanced Persistent Threat (APT) groups
have been observed targeting victims, including US state governments, European
diplomatic entities and Gmail accounts linked to the US government.

The first group, APT41, also known as Wicked Panda and Winti, is believed by
researchers at Mandiant  to have successfully compromised at least six US state
government networks. The APT did so by exploiting vulnerable Internet-facing web
applications, including using zero-day  vulnerabilities in Apache Log4j.

Google’s Threat Analysis Group (TAG) alerted multiple Gmail users affiliated
with the US government of an attempted phishing attack by a Chinese-backed
hacking group, APT31, in February.  TAG warned “multiple” people that APT31
(also known as Judgment Panda and Zirconium) was after their sensitive
information, and that the phishing attacks were successfully blocked in their
email service.

According to TAG multiple Gmail users affiliated with the US government were
alerted to an attempted phishing attack by a Chinese-backed hacking group noted
as APT31 in February.

Fortunately for government officials, the attempted attack was unsuccessful as
all of the emails containing phishing links were automatically marked as spam
and filtered by Gmail. “Today, we sent those people who were targeted government
backed attacker warnings,” Shane Huntley, Director of TAG said on Twitter... We
don’t have any evidence to suggest that this campaign was related to the current
war in Ukraine. In February, we detected an APT31 phishing campaign targeting
high profile Gmail users affiliated with the US government. 100% of these emails
were automatically classified as spam and blocked by Gmail.”

The attempted attack was unsuccessful as the emails were automatically marked as
spam and filtered by Gmail.

There is no evidence that the hacking campaign was associated with the current
war in Ukraine. When government sponsored hackers attempt to send a malicious
email in Gmail, an alert warning them of a potential attack will be
received. According to Google, less than 0.1% of account users will experience
an attack.

Shane Huntley / Twitter:   Silicon Angle:      Oodaloop:   TechRepublic:   
 Techradar:   Newz9:    NewsUpateUK: 

You Might Also Read: 

China’s Dirty Secret - Intellectual Property Theft:

 

« Ukraine's 'IT Army' Risks Being Hijacked By Malware
Facebook Allows Calls for Violence Against Russian Leaders »



Real Attacks. Real Tools. Real Scenarios.
Schedule a demo



Training that transforms behaviours

Sign Up: Cyber Security Intelligence Newsletter


DIRECTORY OF SUPPLIERS

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA)
which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

RESECURITY, INC.

Resecurity is a cybersecurity company that delivers a unified platform for
endpoint protection, risk management, and cyber threat intelligence.

XYPRO TECHNOLOGY

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and
Compliance.

SYXSENSE

Syxsense brings together endpoint management and security for greater efficiency
and collaboration between IT management and security teams.

CYBER SECURITY SUPPLIER DIRECTORY

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service
providers.

JOOBLE

Jooble is a job search aggregator operating in 71 countries worldwide. We
simplify the job search process by displaying active job ads from major job
boards and career sites across the internet.

IT GOVERNANCE

IT Governance is a leading global provider of information security solutions.
Download our free guide and find out how ISO 27001 can help protect your
organisation's information.

CSI CONSULTING SERVICES

Get Advice From The Experts: * Training * Penetration Testing * Data Governance
* GDPR Compliance. Connecting you to the best in the business.

DIGITALSTAKEOUT

DigitalStakeout enables cyber security professionals to reduce cyber risk to
their organization with proactive security solutions, providing immediate
improvement in security posture and ROI.

PRACTICE LABS

Practice Labs is an IT competency hub, where live-lab environments give access
to real equipment for hands-on practice of essential cybersecurity skills.

FRAZER-NASH CONSULTANCY

Frazer-Nash is a leading engineering, systems and technology company. Areas of
expertise include information security and cyber security.

SYNOPSYS

Synopsys is a global leader in electronic design automation and semiconductor IP
and is growing its leadership in software quality and security solutions.

CLAVISTER

Clavister is a network security vendor delivering a full range of network
security solutions for both physical and virtualized environments.

CULTUREAI

CultureAI deliver intelligent cyber security awareness education and tools that
build resilient security cultures where employees help defend.

MORPHUS INFORMATION SECURITY

Morphus is an information security company providing Red Team, Blue Team and GRC
services as well as conducting research in cybersecurity and threat analysis.

VANBREDA

Vanbreda Risk & Benefits is the largest independent insurance broker and risk
consultant in Belgium and the leading insurance partner in the Benelux.

CALYPTIX SECURITY

Calyptix Security helps small and medium offices secure their networks so they
can raise profits, protect investments, and control technology.

SOUTH WEST CYBER RESILIENCE CENTRE (SWCRC)

The South West Cyber Resilience Centre (SWCRC) is led by serving police
officers, as part of a not-for-profit partnership with business and academia.

 * BUSINESS
 * Energy
 * Manufacturing
 * Utilities
 * Consulting
 * Financial
 * Health & Welfare
 * IT & Communications
 * Law
 * Transport & Travel

 * GOVERNMENT
 * Defence
 * Law Enforcement
 * Local
 * National

 * TECHNOLOGY
 * Developments
 * Hackers
 * Resilience
 * 5G Networks
 * Artificial Intelligence
 * Blockchain
 * Internet Of Things
 * Social Media

 * INTELLIGENCE
 * Europe
 * International
 * US
 * China
 * Iran
 * North Korea
 * Russia

 * DIRECTORY
 * Browse Categories
 * Browse Locations
 * Advanced Search
 * 

 * ABOUT US
 * Contact
 * Who We Are
 * Commercial Terms
 * Register / Subscribe
 * Legal

CAPTURED ORGANISED ACCESSIBLE

All content © 2022 Cyber Security Intelligence

site by pixel concepts / redwax

Share
Tweet
Email
Share
Share