Chinese Hackers Accused of Stealing Data

Chinese Hackers Accused of Stealing Data

The Department of Justice has accused two Chinese hackers of stealing valuable data, personal information and trade secrets from hundreds of organizations around the world, including companies that are working to develop coronavirus treatments and vaccines. The suspects were identified as Li Xiaoyu, 34, and Dong Jiazhi, 33, both of whom are believed to be in China.

An 11-count indictment describes a sophisticated scheme that lasted more than 10 years and targeted a variety of industries in the United States, Europe and Asia. Federal prosecutors said they often snooped on companies for own financial gain, but also worked on behalf of the Chinese government.

Several U.S. officials disparaged the Chinese government for allegedly deploying malicious cyber tactics to steal intellectual property from other countries. It was not immediately clear, however, whether the suspects successfully obtained any coronavirus research.

“China has now taken its place, alongside Russia, Iran and North Korea, in that shameful club of nations that provide a safe haven for cyber criminals in exchange for those criminals being ‘on call’ to work for the benefit of the state, here to feed the Chinese Communist party’s insatiable hunger for American and other non-Chinese companies’ hard-earned intellectual property, including COVID-19 research,” said Assistant Attorney General for National Security John Demers.

In a first of its kind move, the United States has criminally charged foreign hackers with targeting companies working to fight COVID-19, even as authorities in North America and the U.K. last week accused a hacking group with ties to the Russian government with trying to steal research on the virus.

The Justice Department said Li and Dong were exploiting publicly known software vulnerabilities in popular web applications. They would then install credential-stealing software on those networks to remotely execute commands on victims’ computers. The pair targeted industries such as high-tech manufacturing, medical device engineering, solar energy, defense, pharmaceuticals, and business, educational and gaming software, authorities said. Other countries targeted were Australia, Belgium, Germany, Japan, Spain, South Korea and the United Kingdom.

The two suspects are charged with unauthorized access, conspiracy to access without authorization and damage computers, conspiracy to commit theft of trade secrets; conspiracy to commit wire fraud and aggravated identity theft.

Featured

  • 91 Percent of Security Leaders Believe AI Set to Outpace Security Teams

    Bugcrowd recently released its “Inside the Mind of a CISO” report, which surveyed hundreds of security leaders around the globe to uncover their perception on AI threats, their top priorities and evolving roles, and common myths directed towards the CISO. Among the findings, 1 in 3 respondents (33%) believed that at least half of companies are willing to sacrifice their customers’ long-term privacy or security to save money. Read Now

  • Milestone Announces Merger With Arcules

    Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, it will merge with the cloud-based video surveillance solutions provider, Arcules. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

  • Cloud Resources Have Become Biggest Targets for Cyberattacks According to New Research

    Thales recently announced the release of the 2024 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3000 IT and security professionals across 18 countries in 37 industries. As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyber-attacks, with SaaS applications (31%), Cloud Storage (30%) and Cloud Management Infrastructure (26%) cited as the leading categories of attack. As a result, protecting cloud environments has risen as the top security priority ahead of all other security disciplines. Read Now

Featured Cybersecurity

Webinars

Whitepapers

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3