#cyber-espionage

[ follow ]
Information security
fromZDNET
7 hours ago

AI's scary new trick: Conducting cyberattacks instead of just helping out

A Chinese state-sponsored group used agentic AI (Claude Code) to conduct a large-scale autonomous cyberespionage campaign, exploiting vulnerabilities and exfiltrating data.
Artificial intelligence
fromZDNET
4 days ago

AI doesn't just assist cyberattacks anymore - now it can carry them out

An AI model, Claude Code, was abused to autonomously conduct most stages of a large-scale cyber espionage attack including discovery, exploitation, and data exfiltration.
fromwww.bbc.com
4 days ago

AI firm claims Chinese spies used its tech to automate cyber attacks

The makers of artificial intelligence (AI) chatbot Claude claim to have caught Chinese government hackers using the tool to perform automated cyber attacks against around 30 global organisations. Anthropic said hackers tricked the chatbot into carrying out automated tasks under the guise of carrying out cyber security research. The company claimed in a blog post this was the "first reported AI-orchestrated cyber espionage campaign".
Artificial intelligence
Information security
fromTechCrunch
6 days ago

Australian spy chief warns Chinese hackers are 'probing' critical networks for espionage and sabotage | TechCrunch

China-backed hacking groups are probing and sometimes accessing Australia's critical infrastructure, pre-positioning malware for potential sabotage and espionage.
Information security
fromThe Hacker News
2 weeks ago

Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More

Cyberattacks are increasingly sophisticated, exploiting new vulnerabilities, trusted systems, and encrypted backups to conduct espionage, ransomware, and phishing across diverse targets.
Information security
fromWIRED
2 weeks ago

Ex-L3Harris Cyber Boss Pleads Guilty to Selling Trade Secrets to Russian Firm

A former executive pleaded guilty to selling trade secrets worth at least $1.3 million to a buyer in Russia.
Information security
fromTheregister
3 weeks ago

North Korean Dream Job attacks hit Europe's UAV sector

North Korea's Lazarus Group used Operation DreamJob fake job offers to deliver malware, compromise European UAV suppliers, and steal IP for espionage.
fromThe Hacker News
3 weeks ago

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

Some of these [companies' are heavily involved in the unmanned aerial vehicle (UAV) sector, suggesting that the operation may be linked to North Korea's current efforts to scale up its drone program," ESET security researchers Peter Kálnai and Alexis Rapin said in a report shared with The Hacker News. It's assessed that the end goal of the campaign is to plunder proprietary information and manufacturing know-how using malware families such as ScoringMathTea and MISTPEN.
Information security
fromThe Hacker News
3 weeks ago

Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware

The cyber espionage activity was first flagged by the Russian cybersecurity vendor in November 2024, when it disclosed a set of attacks aimed at government entities in Latin America and East Asia in June, using never-before-seen malware families tracked as Neursite and NeuralExecutor. It also described the operation as exhibiting a high level of sophistication, with the threat actors leveraging already compromised internal servers as an intermediate command-and-control (C2) infrastructure to fly under the radar.
Information security
Information security
fromIT Pro
1 month ago

A new 'top-tier' Chinese espionage group is stealing sensitive data

A China-linked group, Phantom Taurus, conducts covert cyber-espionage against governments, militaries, and critical infrastructure across Africa, the Middle East, and Asia.
Information security
fromThe Hacker News
1 month ago

Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware

Phantom Taurus conducts stealthy, persistent cyber espionage against government and telecommunications targets across Africa, the Middle East, and Asia.
Information security
fromThe Hacker News
1 month ago

UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors

A suspected China-nexus cyber espionage group used the BRICKSTORM backdoor to maintain long-term access to U.S. legal, SaaS, BPO, and technology organizations and steal data.
Information security
fromTechCrunch
1 month ago

Unit 221B raises $5 million to help track and disrupt today's top hacking groups | TechCrunch

English-speaking teenage and young adult hackers have become a leading global cyber threat, causing large-scale breaches, extortion, and societal harm.
Information security
fromTheregister
2 months ago

China-backed attackers spoof Congressman for US trade data

Chinese state-backed TA415 used trade-themed phishing to compromise US government agencies, think tanks, and academics, using stealthy loaders, developer tools, and cloud services for espionage.
Information security
fromThe Hacker News
2 months ago

Researchers Warn of MystRodX Backdoor Using DNS and ICMP Triggers for Stealthy Control

MystRodX is a stealthy, flexible C++ backdoor that uses layered encryption, passive wake-up triggers via DNS/ICMP, and modular capabilities for remote control and data capture.
Information security
fromThe Hacker News
2 months ago

Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

Russia-linked APT29 ran a watering hole campaign redirecting visitors to attacker-controlled domains to trick users into authorizing devices via Microsoft's device code authentication flow.
#china
Information security
fromTheregister
2 months ago

China's Salt Typhoon gang still present in critical networks

China's Salt Typhoon cyber espionage campaign has targeted critical industries since at least 2019, breaching telecom networks and maintaining long-term access to routers and infrastructure.
Information security
fromNextgov.com
2 months ago

Salt Typhoon hackers targeted over 80 countries, FBI says

Salt Typhoon conducted a multi-year global espionage campaign against telecoms and other networks, targeting phone calls of senior U.S. officials and roughly 80 nations.
fromThe Hacker News
3 months ago

Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

The threat actor leveraged combinations of sophisticated and stealthy techniques creating multilayered attack kill chains to facilitate access to restricted and segmented network assets within presumed to be isolated environments.
Information security
#cybersecurity
Tech industry
fromThe Hacker News
4 months ago

China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom

China-linked Salt Typhoon actors are targeting telecommunications providers for cyber espionage using critical software vulnerabilities.
Roam Research
fromIT Pro
4 months ago

A sneaky cyber espionage campaign is exploiting IoT devices and home office routers - here's what you need to know

A cyber espionage network called 'LapDogs' has compromised thousands of devices globally, primarily targeting the US and Asia.
fromIT Pro
4 months ago
Roam Research

A sneaky cyber espionage campaign is exploiting IoT devices and home office routers - here's what you need to know

Privacy technologies
fromWIRED
4 months ago

How China's Patriotic 'Honkers' Became the Nation's Elite Cyber Spies

Early Chinese hackers formed cooperative groups that evolved into key components of the state’s espionage apparatus.
fromSecuritymagazine
4 months ago

Threat Actor Targeting Indian Defense Sector

APT36's focus on Linux-specific systems, particularly those used in government infrastructure, reinforces that no operating system is off-limits to nation-state attackers. This kind of multi-layered phishing attack highlights how threat actors are constantly evolving their tactics to quietly bypass defenses and exploit user trust.
Privacy professionals
[ Load more ]