April 15, 2026 05:57 am (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
'ECI deviated from Bihar procedure': Supreme Court raises concerns over voter deletion in Bengal SIR | Noida workers’ protest turns violent: Stones pelted, vehicles damaged over wage hike demand | Oil prices jump above $103 a barrel as US moves to block Iran-linked shipping | I don’t care if they come back or not, says Trump after Iran talks collapse | Legendary singer Asha Bhosle suffers cardiac arrest, hospitalised | Big boost to India–Mauritius ties: S. Jaishankar hands over 90 e-buses | Middle East tension: Iranian delegation arrives in Islamabad for major talks, 10,000 security personnel deployed | Ranveer Singh visits RSS HQ amid Dhurandhar 2 success, triggers speculation | ED raids ex-Bengal minister Partha Chatterjee; SSC scam resurfaces ahead of polls | Amit Shah promises UCC, ₹3,000 aid per month for women and youth in BJP’s Bengal manifesto
China
Photo Courtesy: Unsplash

Australian government accuses China-backed hacker group of stealing passwords, usernames from unnamed networks

| @indiablooms | Jul 10, 2024, at 04:06 pm

The Australian Cyber Security Centre has alleged that cyber security firms backed by Chinese authorities stole passwords and usernames from unnamed Australian networks in 2022.

"The PRC state-sponsored cyber group has previously targeted organisations in various countries, including Australia and the United States, and the techniques highlighted below are regularly used by other PRC state-sponsored actors globally. Therefore, the authoring agencies believe the group, and similar techniques remain a threat to their countries’ networks as well," the advisory issued by the Australian Cyber Security Centre.

"This group has previously been reported as being based in Haikou, Hainan Province, PRC and receiving tasking from the PRC MSS, Hainan State Security Department," the advisory said.

In the activity summer, the report said  APT40 has repeatedly targeted Australian networks as well as government and private sector networks in the region, and the threat they pose to our networks is ongoing.

"The tradecraft described in this advisory is regularly observed against Australian networks," the advisory said.

APT40 possesses the capability to rapidly transform and adapt exploit proof-of-concept(s) (POCs) of new vulnerabilities and immediately utilise them against target networks possessing the infrastructure of the associated vulnerability.

APT40 regularly conducts reconnaissance against networks of interest, including networks in the authoring agencies’ countries, looking for opportunities to compromise its targets.

This regular reconnaissance postures the group to identify vulnerable, end-of-life or no longer maintained devices on networks of interest, and to rapidly deploy exploits.

The report said APT40 continues to find success exploiting vulnerabilities from as early as 2017.

"This report details the findings of the ASD’s ACSC investigation into the successful compromise of the organisation’s network between July and September 2022," the advisory said.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.