Security News > 2020 > March > China-linked APT Hackers Launch Coronavirus-Themed Attacks

Even a long-standing China-based APT has begun to use the threat in a new spear-phishing campaign.
Researchers from Check Point Research have found a spear-phishing campaign targeting the Mongolian public sector and apparently emanating from China.
The campaign has similarities to earlier campaigns - such as one targeting the Belarus government and dropping the ByeBye backdoor in 2017.
Although initially used exclusively by these Chinese groups, Anomali has since the summer of 2019 observed it being used in multiple commodity campaigns.
Check Point does not attribute this or the earlier campaigns to any known and named APT group.
News URL
Related news
- New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors (source)
- TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers ‘Apply Psychological Pressure” (source)
- China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware Families (source)
- China-linked FamousSparrow APT group resurfaces with enhanced capabilities (source)
- Hackers Repurpose RansomHub's EDRKillShifter in Medusa, BianLian, and Play Attacks (source)
- Chinese FamousSparrow hackers deploy upgraded malware in attacks (source)
- North Korean hackers adopt ClickFix attacks to target crypto firms (source)
- Infosec experts fear China could retaliate against tariffs with a Typhoon attack (source)
- Russian hackers attack Western military mission using malicious drive (source)
- China names alleged US snoops over Asian Winter Games attacks (source)