Chinese hackers target 27 major universities around the world
According to a recent report by network security company iDefense, Chinese hackers have conducted large-scale attacks aimed at nearly 30 universities in the US and around the world, in a clear effort to take over Access to military research, specifically here the Navy, is being carried out and stored at these universities.
The way of attack is not too new. Hackers have sent these educational institutions phishing emails that are disguised and appear as if they are from a partner university, but when opened, these emails will immediately spread the malicious code. The system is targeted and gradually takes control to steal the necessary data.
- McAfee expert explained how deepfake and AI are drilling through the cyber security wall
The main reason behind these attacks is that traditional universities are considered to be much more 'easy to swallow' than US military contractors, while these institutions are High power can still contain many useful military research materials.
Most network attacks of this type often focus on universities that have research on underwater technology, or own many departments, disciplines and disciplines related to oceanography. According to statistics, many of these 27 universities have a cooperative relationship with the largest oceanographic research institute in the United States, while the institute also has a rather 'close' relationship with the research center. Save the US Navy war, and this is the target the hackers aim for.
- What can organizations do to protect themselves from cyber attacks?
This hacker group has been named by various US security researchers for various nicknames, such as Temp.Periscope, Mudcarp or Leviathan. Their relationship with the Chinese government is unclear, but because this group seems to be targeting US military data only, many analysts believe that some state organization might is the sponsor behind. In other words, this is likely to be a military-political-military cyber attack. The same thing was reported after the investigation of a US Navy contractor's hacking last June.
A note of cyberattacks originating from servers located in China appeared at a time of diplomatic sensitivity when the US was considering introducing stronger bans after a major worry about security. security for giant technology companies from Mainland China such as Huawei and ZTE. Of course Huawei and ZTE both bluntly deny the allegations. But at the same time, there are still new taxes that are constantly being imposed that seriously damage US-China relations.
- China has at least 10 PoP presence points to hijack the network architecture
Network attacks originating in China occurring during this period only complicate the situation and are likely to lead to an even more intense confrontation on cyberspace, threatening to continue Global network security situation.
You should read it
- The cybersecurity tools that every business should know
- The first set of books about hackers and network information security in Vietnam is coming soon
- Top 10 brilliant hackers
- White-hat hackers, from their passion to the job to earn money, and little-known things
- 10 operating systems for security research preferred by hackers
- World hackers in China
- Kevin Mitnick shares tips and tricks that hackers often use
- Upgrade Wi-Fi security from WEP to WPA2
May be interested
- Why are hackers targeting ChatGPT accounts?hackers are using huge resources to steal chatgpt accounts, even free ones.
- TeamViewer is attacked by Chinese hackers, any computer logged in can be controlledteamviewer - a remote control tool used by a lot of people, has been hacked by chinese hackers.
- Do you know the richest people in the world they have ever learned, what to do firstresearch has shown that many of the planet's 100 richest billionaires have been in engineering and have worked in sales.
- Chinese hackers use Dropbox, WordPress attacks Southeast Asiathe chinese cybercrime gang dnscalc has added dropbox and wordpress to the list of malware distribution tools. their goals are government-related individuals and organizations.
- Warning: Hackers can access smart speakersnow, as the trend of smart home grows, this also becomes the ideal target for hackers to exploit vulnerabilities in smart devices from refrigerators and televisions to smart speakers to perform behavior. unrighteous.
- Chinese hackers use fingerprints on glass to crack smartphonestencent's x-lab hacker group demonstrated the technique of unlocking smartphone fingerprint sensors in just 20 minutes using a new application they developed and fingerprinting on glass.
- What is your Chinese name?tipsmake.com will introduce you a tool to see what your chinese name is, to prove that the new vietnamese version is not the same as the simplified chinese transliteration.
- List of best universities in Southeast Asia in 2019few people know that even in southeast asia there are many reputable universities, which are recognized, ranked, and highly appreciated by the world for teaching quality.
- WordPress works again after being attackedwordpress came back after the popular blog system suffered from chinese hackers.
- Do you know who white hat hackers are and how their lives are?what do you understand about hackers? on the battlefield now aside from the black hat hacker there are white hat hackers silently protecting people. so what's the life of white hat hackers?