Skip to main content

Attacks from Chinese hacking group have spiked, U.S. firm says

Attempted cyberattacks from a sophisticated Chinese hacking group have spiked since late January, according to cybersecurity firm FireEye Inc.

FireEye chief security architect Christopher Glyer said more than 75 of its customers were targeted in the attacks across more than a dozen countries, including the United States and Canada. The surge is “one of the broadest campaigns by a Chinese cyber espionage actor we have observed in recent years,” according to a post by FireEye on the cyberattacks.

“We haven’t seen something of this nature in at least three years,” Glyer told Digital Trends.

The group behind the attacks was identified as “APT41,” a China-based team made of contractors working on behalf of the Chinese government, Glyer said.

APT41 exploited flaws in Cisco and Citrix software to target firms across a variety of industries, including banking and finance, healthcare and construction firms.

The surge began on January 20 and lasted at least through March 11, with the group active as recently as this past week. Glyer said there could be numerous factors to explain the uptick in activity, such as the spread of coronavirus or the availability of a public exploit in the Cisco and Citrix software.

APT41, first flagged in 2012, is unique in that the hackers launched cyberattacks both to assist the Chinese government and for personal profit.

“There’s no other group that operates like that,” Glyer said.

In the past, APT41 has targeted telecommunications firms by planting malware that could effectively allow them to read individuals’ text messages or scan for keywords in text conversations, Glyer said.

“We’ve never seen any other group do that or have the sophistication to do that,” he said. “That’s incredibly rare.”

However, there isn’t evidence that the hacking group is using those methods during its recent spike in activity, he added.

It is the latest example of the spike in cyber crimes and attempted hacks that have been happening in and around the ongoing COVID-19 pandemic. With the added pressure of the virus and the change of routine for everyone, hackers are likely to take more advantage of people, security experts say. Already, reports have emerged of hackers posing as World Health Organization or Center for Disease Control officials in phishing attacks.

“From our perspective, we see these hacks all the time when there’s a vulnerability or data leak. The difference now is because of COVID-19 and coronavirus in the news, they [the hackers] are using it as part of their messaging,” said Dave Excell, the founder of Featurespace, a cybersecurity company that uses adaptive behavioral analytics to detect fraudulent activity.

The company works heavily in the financial sector, a space that’s seen a massive shift in the way people spend money, as everyone has moved inside and started using more credit cards online. “We’ve been as busy as ever with our customers, making sure they have the right defense in place as more people are going online to transact,” Excell told Digital Trends.

The World Economic Forum recently said that hackers are setting up fake coronavirus tracking websites and scraping the data from people who visited. In the U.K. victims lost more than 800,000 British pounds to a website promising to sell them protective face masks. Phishing attacks are on the rise, not in the least against the U.S. Department of Health and Human Services.

“If systems are already vulnerable, and the way of thinking is antiquated, and business and organizations don’t have proper protections in place to begin with, times like these will make us more vulnerable,” said Eric Bednash, CEO of RackTop Systems. “Whenever there’s a pandemic or a disaster, all of those things create added pressure, and extra opportunity for the bad guys.”

“Be extra diligent,” Bednash said, even as it might get harder to do so. “Everyone’s searching for ‘coronavirus tracker.’ Make sure you go to a reputable website. If you’re going to look up information on anything related to the pandemic, don’t click on links on your phone or computer that are not from well-known sources.”

Maya Shwayder
I'm a multimedia journalist currently based in New England. I previously worked for DW News/Deutsche Welle as an anchor and…
These new chips could be good news for Copilot+ PCs
The Qualcomm Snapdragon X Plus

The first Copilot+ laptops are already out, powered by Qualcomm's impressive new Snapdragon X chip. The first batch of reviews were delayed, and early impressions have observed the hits and misses of the current chips. But a new leak tells us that Qualcomm might have another ace up its sleeve, and there may be hope for these Arm-based Copilot+ PCs yet. What's new? There might be more models of the chip than what we've been privy to so far.

So far, we've seen reviews of the Asus Vivobook S 15, but that's just one of several chips that fall under the Snapdragon X Elite umbrella. According to files for the Adreno GPU driver, there may be not just six, but 10 different models of the Snapdragon X -- and three of those are Plus chips, which we've previously only seen one of.

Read more
Hacker claims to have hit Apple days after hacking AMD
The Apple logo is displayed at the Apple Store June 17, 2015 on Fifth Avenue in New York City

Data breaches happen all the time, but when the giants get hit, it's impossible not to wonder what kind of critical data may become exposed. Earlier this week, notorious cybercriminal Intelbroker reported that they managed to hack AMD. Now, they followed up with claims about hacking Apple, and went as far as to share some internal source code on a hacking forum.

As Apple has yet to comment, all we have to go off is the forum post, first shared by HackManac on X (formerly Twitter). In the post, Intelbroker states that Apple suffered a data breach that led to the exposure of the source code for some of its internal tools. The tools include AppleConnect-SSO, Apple-HWE-Confluence-Advanced. There's been no mention of any customer data being leaked, which is good news, but there could still be some impact on Apple if this proves to be true.

Read more
OLED laptops are about to get brighter, thinner, and more expensive
A woman holds a laptop with the LG Tandem OLED logo on it.

LG's new Tandem OLED panel is entering mass production, which is good news for upcoming AI laptops. Today, LG announced that it's the first manufacturer to produce the Tandem OLED panel in a 13-inch variant, and the displays are said to be much thinner and lighter while delivering better performance. The catch? This screen upgrade, which is already available in the latest Dell XPS 13 Copilot+ PC, is going to cost you a pretty penny.

Tandem OLED is a display panel design that has mostly been used in cars up until now, and LG is breaking new ground by producing it for laptops. However, it's not the first time we've seen this design applied to consumer electronics, as Apple's M4 iPad Pros utilize Tandem OLED displays.

Read more