Mandiant said the majority impact in the Americas may partially reflect the geography of Barracuda’s customer base.
After discovering it in mid-May, Barracuda released containment and remediation patches but the hacking group, which Mandiant identifies as UNC4841, altered their malware to try to maintain access, Mandiant said.
Mandiant says China-backed hackers exploited Barracuda zero-day to spy on governments | TechCrunch
Mandiant, which was called in to run Barracuda’s incident response, said the hackers exploited the flaw to compromise hundreds of organizations likely as part of an espionage campaign in support of the Chinese government.
Almost a third of the targeted organizations are government agencies, Mandiant said in a report published Thursday.
Security Firm: Chinese Hackers Broke into Email Security Appliance in Spying Campaign
Mandiant said the majority impact in the Americas may partially reflect the geography of Barracuda’s customer base.
After discovering it in mid-May, Barracuda released containment and remediation patches but the hacking group, which Mandiant identifies as UNC4841, altered their malware to try to maintain access, Mandiant said.
Ingenious Hackers Used iPhone 13 To Steal Samsung Galaxy Crypto Key—Here's How To Stop Them
The National Security Agency (NSA) has been well aware of a military spying technique known as TEMPEST which focuses on leaking emanations such as sounds, vibrations, and radio or electrical signals.
Fast-forward to 2021 and security researchers used an analysis of optical emanations from LED power indicators of speakers to recover and record sound. Invisible to the naked eye, the minute fluctuations in intensity of the LED could be read by an electro-optical sensor attached to a telescope.
Russian hackers allegedly breach US government agencies in cyberattack
While all the affected agencies have not been identified, a Department of Energy representative confirmed with CNN that the agency was among the targets. In addition to the U.S. government agencies, "several hundred" U.S.
The cyberattacks did not have any "significant impacts" on the federal agencies, CISA Director Jen Easterly said in a statement to the press, noting that the hackers were "largely opportunistic" in exploiting the software flaw to access networks.
Cybersecurity firm Mandiant says state-backed Chinese hackers have accessed the networks of hundreds of public and… https://t.co/VjxxABIQOt spectatorindex (from Global) Thu Jun 15 22:21:50 +0000 2023
Suspected state-backed Chinese hackers exploited a vulnerability in a popular email security appliance to break int… https://t.co/tzyYmA2OCo AP (from Global) Thu Jun 15 15:49:08 +0000 2023
UPDATES - Suspected state-backed Chinese hackers reportedly broke into the networks of hundreds of public and priva… https://t.co/15xweXER46 TheInsiderPaper (from Global) Thu Jun 15 17:02:02 +0000 2023
Word of the breach came as U.S. Secretary of State Antony Blinken departs for China this weekend as part of the Bid… https://t.co/HW4q4A3Qqc NewsHour (from Arlington, VA) Fri Jun 16 10:42:00 +0000 2023
No comments:
Post a Comment