Security News > 2020 > March > China-linked APT Hackers Launch Coronavirus-Themed Attacks
Even a long-standing China-based APT has begun to use the threat in a new spear-phishing campaign.
Researchers from Check Point Research have found a spear-phishing campaign targeting the Mongolian public sector and apparently emanating from China.
The campaign has similarities to earlier campaigns - such as one targeting the Belarus government and dropping the ByeBye backdoor in 2017.
Although initially used exclusively by these Chinese groups, Anomali has since the summer of 2019 observed it being used in multiple commodity campaigns.
Check Point does not attribute this or the earlier campaigns to any known and named APT group.
News URL
Related news
- Researchers Uncover Espionage Tactics of China-Based APT Groups in Southeast Asia (source)
- 390,000 WordPress accounts stolen from hackers in supply chain attack (source)
- Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks (source)
- Russian hackers use RDP proxies to steal data in MiTM attacks (source)
- Chinese hackers targeted sanctions office in Treasury attack (source)
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Hackers use FastHTTP in new high-speed Microsoft 365 password attacks (source)
- Hackers game out infowar against China with the US Navy (source)
- China-aligned PlushDaemon APT compromises supply chain of Korean VPN (source)
- PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack (source)