April 20, 2025 10:37 am (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
Narendra Modi to visit Saudi Arabia next week, deepening multi-faceted partnership on agenda | Trump says US will 'take a pass' on Russia-Ukraine peace talks if parties make it difficult | Andhra student dies in accident in US' Texas days before her graduation | Karnataka students allegedly forced to remove sacred threads at CET exam centre, sparks outrage | Bengal BJP leader Dilip Ghosh marries party colleague Rinku Majumdar in an intimate ceremony today | Narendra Modi, Elon Musk discuss Indo-US tech collaboration | 'Focus on protecting rights of own minorities': India slams Bangladesh's remark on Murshidabad riots | Gangster Harpreet Singh, alias Happy Passia, responsible for Punjab terror attacks arrested in US | No change in 'waqf by user' for now till next hearing: Supreme Court to Centre | Supreme Court rules Bengal govt teachers 'not identified as tainted' in SSC scam can continue till fresh appointments
China
Photo Courtesy: Unsplash

Australian government accuses China-backed hacker group of stealing passwords, usernames from unnamed networks

| @indiablooms | Jul 10, 2024, at 04:06 pm

The Australian Cyber Security Centre has alleged that cyber security firms backed by Chinese authorities stole passwords and usernames from unnamed Australian networks in 2022.

"The PRC state-sponsored cyber group has previously targeted organisations in various countries, including Australia and the United States, and the techniques highlighted below are regularly used by other PRC state-sponsored actors globally. Therefore, the authoring agencies believe the group, and similar techniques remain a threat to their countries’ networks as well," the advisory issued by the Australian Cyber Security Centre.

"This group has previously been reported as being based in Haikou, Hainan Province, PRC and receiving tasking from the PRC MSS, Hainan State Security Department," the advisory said.

In the activity summer, the report said  APT40 has repeatedly targeted Australian networks as well as government and private sector networks in the region, and the threat they pose to our networks is ongoing.

"The tradecraft described in this advisory is regularly observed against Australian networks," the advisory said.

APT40 possesses the capability to rapidly transform and adapt exploit proof-of-concept(s) (POCs) of new vulnerabilities and immediately utilise them against target networks possessing the infrastructure of the associated vulnerability.

APT40 regularly conducts reconnaissance against networks of interest, including networks in the authoring agencies’ countries, looking for opportunities to compromise its targets.

This regular reconnaissance postures the group to identify vulnerable, end-of-life or no longer maintained devices on networks of interest, and to rapidly deploy exploits.

The report said APT40 continues to find success exploiting vulnerabilities from as early as 2017.

"This report details the findings of the ASD’s ACSC investigation into the successful compromise of the organisation’s network between July and September 2022," the advisory said.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.
Close menu