Main topic: Russian state-sponsored hackers posing as technical support staff on Microsoft Teams to compromise global organizations, including government agencies.
Key points:
1. The hacking campaign was carried out by a Russian state-sponsored group known as APT29 or Cozy Bear.
2. The group is linked to the SolarWinds attack in 2020 and is part of Russia's Foreign Intelligence Service.
3. The hackers used previously compromised Microsoft 365 accounts to create new technical support-themed domains.
4. They sent Microsoft Teams messages to manipulate users into granting approval for multi-factor authentication prompts.
5. By gaining access to user accounts, the hackers aimed to exfiltrate sensitive information.
6. Less than 40 unique global organizations were targeted or breached, including government agencies, non-government organizations, and various sectors.
7. Microsoft has mitigated the use of the domains and continues to investigate the activity.
8. The campaign follows a recent incident where Chinese hackers exploited a flaw in Microsoft's cloud email service.
Main topic: Cybersecurity breach in Japan's defense networks by hackers from China.
Key points:
1. Hackers from China had "deep, persistent access" to Japanese defense networks.
2. The breach was discovered by the National Security Agency in late 2020 and persisted through the end of the Trump administration and early 2021.
3. Japan initially declined assistance from US Cyber Command and opted for domestic commercial security firms, but later adopted a more active national security strategy, including the establishment of a new cyber command and the addition of 4,000 cybersecurity personnel.
Main Topic: China's hackers positioning themselves for destructive cyberattacks on U.S. critical infrastructure.
Key Points:
1. China's hackers have the capability to conduct destructive cyberattacks on U.S. critical infrastructure.
2. Historically, China's cyber activity has focused on espionage and data theft, not destructive attacks.
3. U.S. officials are raising alarms and urging critical infrastructure operators to prepare for potential cyberattacks from China.
Chinese hackers targeted government and government-linked organizations worldwide, exploiting a zero-day vulnerability in Barracuda Email Security Gateway (ESG), with a particular focus on entities in the Americas, according to a report by Mandiant. Almost one-third of the hacked appliances belonged to government agencies, and the attacks were motivated by espionage, with a threat actor known as UNC4841 exfiltrating data from high-profile users in government and high-tech industries. Despite patches, the FBI warns that compromised devices are still being targeted, and advises customers to replace hacked appliances and investigate potential breaches.
Microsoft researchers have discovered a network of fake social media accounts controlled by China that use artificial intelligence to influence US voters, according to a new research report.
Chinese state-backed hackers are exploiting a critical zero-day vulnerability in Atlassian software, allowing them to break into customer systems, according to Microsoft's threat intelligence team.
China is accused by the Five Eyes intelligence network of intellectual property theft and using artificial intelligence for hacking and spying, posing an "unprecedented threat" to global innovation.
China's theft of intellectual property and trade secrets, including in AI, is a major threat to the West, according to global intelligence leaders from the Five Eyes alliance of the U.S., Canada, UK, Australia, and New Zealand, with FBI Director Christopher Wray calling China the "defining threat of this generation."
China's massive theft of intellectual property, trade secrets, and personal data poses an unprecedented threat to global innovation, economic security, and national security, according to intelligence chiefs from the United States, Canada, the United Kingdom, Australia, and New Zealand.