Security News > 2020 > March > China-linked APT Hackers Launch Coronavirus-Themed Attacks
Even a long-standing China-based APT has begun to use the threat in a new spear-phishing campaign.
Researchers from Check Point Research have found a spear-phishing campaign targeting the Mongolian public sector and apparently emanating from China.
The campaign has similarities to earlier campaigns - such as one targeting the Belarus government and dropping the ByeBye backdoor in 2017.
Although initially used exclusively by these Chinese groups, Anomali has since the summer of 2019 observed it being used in multiple commodity campaigns.
Check Point does not attribute this or the earlier campaigns to any known and named APT group.
News URL
Related news
- North Korean govt hackers linked to Play ransomware attack (source)
- China's Volt Typhoon reportedly breached Singtel in 'test-run' for US telecom attacks (source)
- Hackers increasingly use Winos4.0 post-exploitation kit in attacks (source)
- China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait (source)
- Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks (source)
- Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations (source)
- T-Mobile US 'monitoring' China's 'industry-wide attack' amid fresh security breach fears (source)
- China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks (source)
- Hackers breach US firm over Wi-Fi from Russia in 'Nearest Neighbor Attack' (source)
- APT-C-60 Hackers Exploit StatCounter and Bitbucket in SpyGlace Malware Campaign (source)