Security News > 2011 > March > Industry chain behind hacker attacks on government websites
http://news.xinhuanet.com/english2010/china/2011-03/31/c_13806104.htm English.news.cn 2011-03-31 BEIJING, March 31 (Xinhuanet) -- Two young men, Fan Dongdong and Wen Chao, who have only a junior high school education, received 18- and 12-month sentences for hacking into the website of the country's Supreme People's Procuratorate, the top agency for legal supervision, and more than a dozen other government websites. Xin Zuguo, a judge with the People's Court of Chaoyang District in Beijing, said this was not an isolated case. From May 10 to 16 of last year, 81 government websites on the mainland were hacked and altered, including four ministry-level websites, according to the National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC). The rampant hacking against government websites is aimed at making illegal profits, and an "industry chain" already exists, Xinhua reported. The hackers can make money by putting illegal links on the government websites. [...] ___________________________________________________________ Tegatai Managed Colocation: Four Provider Blended Tier-1 Bandwidth, Fortinet Universal Threat Management, Natural Disaster Avoidance, Always-On Power Delivery Network, Cisco Switches, SAS 70 Type II Datacenter. Find peace of mind, Defend your Critical Infrastructure. http://www.tegataiphoenix.com/
News URL
http://news.xinhuanet.com/english2010/china/2011-03/31/c_13806104.htm
Related news
- Microsoft still unsure how hackers stole MSA key in 2023 Exchange attack (source)
- Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack (source)
- TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks (source)
- Hackers hijack OpenMetadata apps in Kubernetes cryptomining attacks (source)
- REvil hacker behind Kaseya ransomware attack gets 13 years in prison (source)
- Kimsuky hackers deploy new Linux backdoor in attacks on South Korea (source)
- Iranian MOIS-Linked Hackers Behind Destructive Attacks on Albania and Israel (source)
- Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack (source)