Security News > 2022 > March > Chinese hackers attempted phishing on emails affiliated with US government

Chinese hackers attempted phishing on emails affiliated with US government.
According to Google's Threat Analysis Group, multiple Gmail users affiliated with the U.S. government were alerted to an attempted phishing attack by a Chinese-backed hacking group noted as APT31 in February.
Fortunately for government officials, the attempted attack was unsuccessful as all of the emails containing phishing links were automatically marked as spam and filtered by Gmail.
"We don't have any evidence to suggest that this campaign was related to the current war in Ukraine. In February, we detected an APT31 phishing campaign targeting high profile Gmail users affiliated with the U.S. government. 100% of these emails were automatically classified as spam and blocked by Gmail."
"By phishing humans, they look at it as the more accessible way into the systems and infrastructure. Gaining access through a government employee's email address is easy to bypass the technology and gain entry into the government infrastructure and systems."
Also See Share: Chinese hackers attempted phishing on emails affiliated with US government.
News URL
Related news
- Chinese hackers use custom malware to spy on US telecom networks (source)
- US charges Chinese hackers linked to critical infrastructure breaches (source)
- Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks (source)
- Chinese hackers abuse Microsoft APP-v tool to evade antivirus (source)
- US minerals company says crooks broke into email and helped themselves to $500K (source)
- Beware: PayPal "New Address" feature abused to send phishing emails (source)
- FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services (source)
- 2024 phishing trends tell us what to expect in 2025 (source)
- Belgium probes if Chinese hackers breached its intelligence service (source)
- Belgium probes if Chinese hackers breached its intelligence service (source)