Technology
Chinese state-sponsored cyber espionage threat group identified
New Delhi, Aug 7
A new Chinese state-sponsored cyber espionage threat group named "Double Dragon" or "APT41" that is conducting financially-motivated activity for personal gain has been identified by cybersecurity company FireEye.
The group's activity traces back to 2012 when individual members of "APT41" conducted primarily financially-motivated operations focused on the video game industry before expanding into likely state-sponsored activity.
"Over the last seven years, 'APT41' has targeted organisations in 14 countries, out of which India has also been a prime target. Rest of the countries span across Asia Pacific, European, African and American regions," the cybersecurity company said in a statement.
The threat group is known to use its access to production environments to inject malicious code into legitimate files which are later distributed to victim organisations.
Espionage operations occurred while the group was still carrying out financially-motivated campaigns, including longer-term intrusions which typically extended for more than a year, FireEye added.
In one instance, "APT41" was attempting to steal data from a healthcare target while also attempting to deploy ransomware at a video game studio.
The group's activity traces back to 2012 when individual members of "APT41" conducted primarily financially-motivated operations focused on the video game industry before expanding into likely state-sponsored activity.
"Over the last seven years, 'APT41' has targeted organisations in 14 countries, out of which India has also been a prime target. Rest of the countries span across Asia Pacific, European, African and American regions," the cybersecurity company said in a statement.
The threat group is known to use its access to production environments to inject malicious code into legitimate files which are later distributed to victim organisations.
Espionage operations occurred while the group was still carrying out financially-motivated campaigns, including longer-term intrusions which typically extended for more than a year, FireEye added.
In one instance, "APT41" was attempting to steal data from a healthcare target while also attempting to deploy ransomware at a video game studio.
6 hours ago
Anti-India hate surges online amid immigration debate in US: Report
6 hours ago
Iran's new Supreme Leader vows revenge, says Strait of Hormuz will remain closed
8 hours ago
EAM Jaishankar and Indonesian counterpart discuss West Asia conflict, bilateral ties
8 hours ago
West Asia conflict: Gulf producers cut output by 10 million BPD as Hormuz traffic stalls, says report
13 hours ago
Energy security compromised due to flawed foreign policy; govt must prepare: Rahul Gandhi
13 hours ago
Air India seeks DGCA nod to relax flight duty norms amid geopolitical tensions
14 hours ago
Divyanka Tripathi shares her relationship rule for hubby Vivek Dahiya
14 hours ago
Ranveer Singh-starrer ‘Dhurandhar’ to re-releases in cinemas a week ahead of release of 2nd part of the franchise
14 hours ago
Nasser tells Telugu actor Rajendra Prasad: Tender an apology from your heart!
14 hours ago
Genelia D’Souza reminds all the mothers out there: Focus on progress not perfection
14 hours ago
Indian sailor killed in Iran attack on US-owned oil tanker, 15 crew members evacuated
14 hours ago
Rajendra Vishwanath Arlekar sworn in as Acting Governor of Tamil Nadu
14 hours ago
Opposition claims LPG shortage; ruling alliance MPs assure there is no need to panic
