www.aiupnow.com Open in urlscan Pro
2a00:1450:4001:810::2013  Public Scan

URL: https://www.aiupnow.com/2021/12/microsoft-seizes-42-malicious-web.html
Submission: On December 07 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

GET /search

<form action="/search" id="searchform" method="get">
  <input name="q" placeholder="Search" type="text" vk_18d09="subscribed" vk_1ad21="subscribed" vk_1b6ba="subscribed">
</form>

Name: contact-form

<form name="contact-form">
  <p></p> Name <br>
  <input class="contact-form-name" id="ContactForm1_contact-form-name" name="name" size="30" type="text" value="">
  <p></p> Email <span style="font-weight: bolder;">*</span>
  <br>
  <input class="contact-form-email" id="ContactForm1_contact-form-email" name="email" size="30" type="text" value="">
  <p></p> Message <span style="font-weight: bolder;">*</span>
  <br>
  <textarea class="contact-form-email-message" cols="25" id="ContactForm1_contact-form-email-message" name="email-message" rows="5"></textarea>
  <p></p>
  <input class="contact-form-button contact-form-button-submit" id="ContactForm1_contact-form-submit" type="button" value="Send">
  <p></p>
  <div style="text-align: center; max-width: 222px; width: 100%">
    <p class="contact-form-error-message" id="ContactForm1_contact-form-error-message"></p>
    <p class="contact-form-success-message" id="ContactForm1_contact-form-success-message"></p>
  </div>
</form>

Name: contact-form

<form name="contact-form">
  <input class="contact-form-name" id="ContactForm10_contact-form-name" name="name" placeholder="Name" size="30" type="text" value="">
  <input class="contact-form-email" id="ContactForm10_contact-form-email" name="email" placeholder="Email" size="30" type="text" value="">
  <textarea class="contact-form-email-message" cols="25" id="ContactForm10_contact-form-email-message" name="email-message" placeholder="Message" rows="5"></textarea>
  <input class="contact-form-button contact-form-button-submit" id="ContactForm10_contact-form-submit" type="button" value="Send">
  <br>
  <div style="text-align: center; width: 100%;">
    <div class="contact-form-error-message" id="ContactForm10_contact-form-error-message">
    </div>
    <div class="contact-form-success-message" id="ContactForm10_contact-form-success-message">
    </div>
  </div>
</form>

Text Content

Microsoft Seizes 42 Malicious Web Domains Used By Chinese Hackers #Cybersecurity
- The Entrepreneurial Way with A.I.

 * 
 * 
 * 
 * 
 * 
 * 

 * Home
 * About
 * Policy
 * Contact

MenuHomeAboutPolicyContact



BREAKING

 * 
 * 
   IoT
   
   
   EBOOK: PROVEN STRATEGIES TO BOOST INDUSTRIAL OPERATIONAL EFFICIENCY AND
   SUSTAINABILITY #IOT

 * 
   contact@bcurdy.com
   
   
   PORTO-BASED INFRASPEAK GETS €10 MILLION BOOST FOR ITS PIONEERING INTELLIGENCE
   PLATFORM FOR MAINTENANCE AND FACILITY MANAGEMENT #STARTUPS

 * 
   contact@bcurdy.com
   
   
   AMSTERDAM’S CHEFLIX RAISES €2 MILLION FOR ITS ‘NETFLIX OF STAR CHEFS’
   STREAMING PLATFORM #STARTUPS

 * 
   Anasia D'mello
   
   
   PASSWORD MANAGERS GO MAINSTREAM AND REVEAL NEED FOR C-SUITE DRIVEN SECURITY
   CONSISTENCY #IOT

 * 
   contact@bcurdy.com
   
   
   DUTCH MOTORHOME SHARING PLATFORM GOBOONY DRIVES OFF WITH €6 MILLION TO
   FURTHER EXPAND ACROSS EUROPE #STARTUPS

  



 * Home
 * Big Tech
   * Apple
   * Google
   * Amazon
   * Microsoft
   * Facebook
 * Hacker News
   * A.I.
   * IoT
   * SAAS
   * Cloud
   * CyberSecurity
   * Machine Learning
 * Startups
   * SEO
   * IPO
   * Ecommerce
   * Entrepreneur
   * Small Business
 * Gaming
   * Gadgets
   * Latest Tech
 * Music
 * Video

MenuHomeBig Tech- Apple- Google- Amazon- Microsoft- FacebookHacker News- A.I.-
IoT- SAAS- Cloud- CyberSecurity- Machine LearningStartups- SEO- IPO- Ecommerce-
Entrepreneur- Small BusinessGaming- Gadgets- Latest TechMusicVideo





TUESDAY, DECEMBER 7, 2021

Home Cybersecurity Khareem Sudlow noreply@blogger.com (Ravie Lakshmanan)
Microsoft Seizes 42 Malicious Web Domains Used By Chinese Hackers #Cybersecurity


MICROSOFT SEIZES 42 MALICIOUS WEB DOMAINS USED BY CHINESE HACKERS #CYBERSECURITY

BruceDayne 3:18 AM Cybersecurity, Khareem Sudlow, noreply@blogger.com (Ravie
Lakshmanan),



#HackerNews

Microsoft on Monday announced the seizure of 42 domains used by a China-based
cyber espionage group that set its sights on organizations in the U.S. and 28
other countries pursuant to a legal warrant issued by a federal court in the
U.S. state of Virginia.

The Redmond company attributed the malicious activities to a group it pursues as
Nickel, and by the wider cybersecurity industry under the monikers APT15, Bronze
Palace, Ke3Chang, Mirage, Playful Dragon, and Vixen Panda. The advanced
persistent threat (APT) actor is believed to have been active since at least
2012.

"Nickel has targeted organizations in both the private and public sectors,
including diplomatic organizations and ministries of foreign affairs in North
America, Central America, South America, the Caribbean, Europe and Africa,"
Microsoft's Corporate Vice President for Customer Security and Trust, Tom Burt,
said. "There is often a correlation between Nickel's targets and China's
geopolitical interests."

The rogue infrastructure enabled the hacking crew to maintain long-term access
to the compromised machines and execute attacks for intelligence gathering
purposes targeting unnamed government agencies, think tanks, and human rights
organizations as part of a digital espionage campaign dating back to September
2019.

Microsoft painted the cyber assaults as "highly sophisticated" that used a
multitude of techniques, including breaching remote access services and
exploiting vulnerabilities in unpatched VPN appliances as well as Exchange
Server and SharePoint systems to "insert hard-to-detect malware that facilitates
intrusion, surveillance and data theft."

Upon gaining an initial foothold, Nickel has been found deploying credential
dumping tools and stealers such as Mimikatz and WDigest to hack into victim
accounts, followed by delivering custom malware that allowed the actor to
maintain persistence on victim networks over extended periods of time and
conduct regularly scheduled exfiltration of files, execute arbitrary shellcode,
and collect emails from Microsoft 365 accounts using compromised credentials.

The multiple backdoor families used for command and control are being tracked as
Neoichor, Leeson, NumbIdea, NullItch, and Rokum.

The latest wave of attacks adds to an extensive list of surveillanceware
campaigns mounted by the APT15 group in recent years. In July 2020, mobile
security firm Lookout disclosed four trojanized legitimate apps — named
SilkBean, DoubleAgent, CarbonSteal, and GoldenEagle — that targeted the Uyghur
ethnic minority and the Tibetan community with the goal of gathering and
transmitting personal user data to adversary-operated command-and-control
servers.

"As China's influence around the world continues to grow and the nation
establishes bilateral relations with more countries and extends partnerships in
support of China's Belt and Road Initiative, we assess that China-based threat
actors will continue to target customers in government, diplomatic, and NGO
sectors to gain new insights, likely in pursuit of economic espionage or
traditional intelligence collection objectives," Microsoft said.

Found this article interesting? Follow THN on

Facebook

,

Twitter

and

LinkedIn

to read more exclusive content we post.



via https://www.AiUpNow.com

December 7, 2021 at 03:18AM by noreply@blogger.com (Ravie Lakshmanan), Khareem
Sudlow
Tags # Cybersecurity # Khareem Sudlow # noreply@blogger.com (Ravie Lakshmanan)



 * 0
   Shares
 * Pin
 * Share
 * Tweet
 * Share
 * Share
 * Share
 * Share
 * Mail
 * Share



About BruceDayne
Block-Chain Evangelist and Entrepreneur, Khareem Sudlow now founded, advised and
invested in various blockchain projects.

 * 
 * 
 * 
 * 
 * 
 * 





Newer Article Dutch motorhome sharing platform Goboony drives off with €6
million to further expand across Europe #StartUps Older Article Gravatar
“Breach” Exposes Data of 100+ Million Users via @sejournal, @martinibuster



MICROSOFT SEIZES 42 MALICIOUS WEB DOMAINS USED BY CHINESE HACKERS #CYBERSECURITY




MALICIOUS KMSPICO WINDOWS ACTIVATOR STEALING USERS' CRYPTOCURRENCY WALLETS
#CYBERSECURITY




HACKERS STEAL $200 MILLION WORTH OF CRYPTOCURRENCY TOKENS FROM BITMART EXCHANGE
#CYBERSECURITY


By BruceDayne at 3:18 AM
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: Cybersecurity, Khareem Sudlow, noreply@blogger.com (Ravie Lakshmanan)


Newer Post Older Post Home


 * blogger
 * disqus
 * facebook











AUTHOR DETAILS





FRESH BEATS ADDED DAILY!







FACEBOOK

 * 
 * 
 * 
 * 
 * 
 * 



 * Microsoft
 * Amazon
 * Apple


RELEASING WINDOWS 11 BUILD 22000.348 TO BETA AND RELEASE PREVIEW CHANNELS #AZURE

BruceDayneNov 19, 2021


GET TO KNOW WINDOWS 11 WIDGETS WITH THESE 11 FAVES #AZURE

BruceDayneNov 19, 2021


SURVEY UNWRAPS WHAT MOMS REALLY WANT THIS HOLIDAY SEASON #AZURE

BruceDayneNov 17, 2021


TOTAL WAR: WARHAMMER III WILL LAUNCH WITH GAME PASS FOR PC ON FEB. 17 #AZURE

BruceDayneNov 04, 2021



TOP ANNOUNCEMENTS OF AWS RE:INVENT 2021 #AWS

BruceDayneNov 29, 2021


AMAZON CODEGURU REVIEWER INTRODUCES SECRETS DETECTOR TO IDENTIFY HARDCODED
SECRETS AND SECURE THEM WITH AWS SECRETS MANAGER #AWS

BruceDayneNov 29, 2021


PREVIEW – AWS IOT ROBORUNNER FOR BUILDING ROBOT FLEET MANAGEMENT APPLICATIONS
#AWS

BruceDayneNov 29, 2021


ANNOUNCING THE AWS ROBOTICS STARTUP ACCELERATOR: IT’S STILL DAY ONE FOR ROBOTICS
#AWS

BruceDayneNov 29, 2021


IFIXIT'S APPLE WATCH SERIES 6 TEARDOWN DISCOVERS LARGER CAPACITY BATTERIES

BruceDayneSept 21, 2020


THE 8TH-GENERATION IPAD IS ALREADY $30 OFF AT WALMART

BruceDayneSept 20, 2020


THE APPLE WATCH DOESN'T COME WITH A POWER ADAPTER ANYMORE

BruceDayneSept 15, 2020


APPLE SIGNS FORMER HBO CHIEF TO A FIVE-YEAR DEAL

UnknownJan 02, 2020



CODING INSTRUMENTAL





VIRTUAL REALITY


GET THE MOST OUT OF YOUR GAME WITH THESE PC GAMING HEADSETS

BruceDayneSept 19, 2020


A FAN IS ATTEMPTING TO MAKE A HALO: REACH VR MOD ON PC #VR

BruceDayneDec 12, 2019


MAGIC LEAP REPORTEDLY ONLY SOLD 6,000 AR HEADSETS IN SIX MONTHS #VR

UnknownDec 07, 2019


LOW BUDGET VR SET UP

UnknownAug 06, 2019




ARCHIVE

Archive December (275) November (1377) October (1321) September (751) May (332)
April (693) March (709) February (634) January (694) December (728) November
(677) October (635) September (696) August (624) July (603) June (605) May (598)
April (524) March (618) February (2279) January (3299) December (694) November
(608) October (667) September (628) August (635) July (579) June (458) May (972)


TAGS

Khareem Sudlow Tech Startups Ecommerce Cybersecurity Small Business IoT A.I.
Amazon Entrepreneur BruceDayne IPO Microsoft Google Gaming Video YouTube Gadgets
Music Apple Facebook Spotify VR Machine Learning SEO SAAS Cloud




WHAT IS A.I. UP TO NOW?


Blogs For Gadget Lovers. Have A Great Business Idea And You're Ready To Build
Your Future, But Don't Know Where To Start? Let AiUpNow Guide You.



CONNECT WITH US

 * 
 * 
 * 
 * 
 * 
 * 




TRENDING

 * Everynet Launches LoRaWAN® Service in Seven More Major Metropolitan Areas
   #IoT
   #I.o.T. Everynet, the world’s largest network operator for national LoRaWAN®
   networks, today expanded their LoRaWAN network across seven m...
   
 * Warning: Yet Another Zoho ManageEngine Product Found Under Active Attacks
   #Cybersecurity
   #HackerNews Enterprise software provider Zoho on Friday warned that a newly
   patched critical flaw in its Desktop Central and Desktop Cent...
   
 * Twitter Bans Users From Posting ‘Private Media’ Without a Person's Consent
   #Cybersecurity
   #HackerNews Twitter on Tuesday announced an expansion to its private
   information policy to include private media, effectively prohibiting...
   




CONTACT FORM



Name




Email *




Message *









CONTACT






Copyright © 2021 The Entrepreneurial Way with A.I.

| Created By Khareem Sudlow
 * 
 * 
 * 
 * 
 * 
 * 

Diese Website verwendet Cookies von Google, um Dienste anzubieten und Zugriffe
zu analysieren. Deine IP-Adresse und dein User-Agent werden zusammen mit
Messwerten zur Leistung und Sicherheit für Google freigegeben. So können
Nutzungsstatistiken generiert, Missbrauchsfälle erkannt und behoben und die
Qualität des Dienstes gewährleistet werden.Weitere InformationenOk
This website uses cookies
Okay
More info
 * 0
   Shares
 * Share
 * Pin
 * Share
 * Tweet
 * Share
 * Share


 * Pin
 * Share
 * Tweet
 * Share


X