FireEye: Chinese APT30 monitors governments from 2004

A Chinese group of hackers reportedly has been monitoring governments for over a decade, according to FireEye. The hacker APT30 team was unveiled by FireEye, a company that claims to spy on Asian and Pacific governments in 2004 in general.FireEye APT 30

FireEye reports in her report that the group APT30 has a particular interest in political developments in Southeast Asia and the , and is particularly active at the time of the Southeast Asian summits. fireeye apt30

It also focuses on regional issues and territorial differences between China, India and Southeast Asian countries.

The FireEye report, APT30 and the Mechanics of a Long-Running Cyber ​​Espionage Operation (PDF), reports that the group has been steadily focusing on Southeast Asia and India in the last 10 years.

APT30, in addition to Asian governments, is also targeting media companies and journalists who denounce issues surrounding the region.

"We have analyzed over 200 samples of malware as well as remote controller software using a GUI, and we are able to estimate that it has been developed by the APT 30 team," says FireEye.

"All of their hacks are focused on acquiring sensitive data from several targets, who may be using government networks and other networks that are inaccessible by a formal internet connection."

"Most of APT30's efforts use social engineering and show that they are particularly interested in regional policy, military and economic issues, disputed territories, media companies and journalists reporting on China and government legitimacy." reports the FireEye report, showing China behind the team.

The security firm's white paper also states that while accountability is always a difficult task, evidence suggests that the APT30 team may be funded by the Chinese authorities.

"Such prolonged, planned efforts to develop new tools, combined with the regional goals and missions of the team, lead us to believe that their activities are funded by some state, and probably by the Chinese government," the report states. .

The group allegedly infects its victims with messages , and uses sophisticated attack tools developed over the past 10 years.

FireEye said some malware programs used by APT 30, mainly Backspace and Flashflood, are used to infect systems and steal data from the air. The striking thing is that these malicious tools seem to have been designed when their 2005 efforts started.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).