European & American Hackers Attack China

Chinese cyber security experts say that a hacking group, which draws its principal members from Europe and North America, has been launching cyber attacks against China, posing a serious threat to the China's national cyber security.

The hacking group, which has been named Against The West (ATW), is claimed by Chinese sources to have exposed sensitive information, including source code and databases of critical information systems related to China. 

Since last year, ATW has intensified large-scale intrusion, detection and supply chain attacks on Chinese networks. These exploits have happened more than 70 times since 2021, involving some 300 information systems of more than 100 important government agencies, aviation and critical infrastructure.

Through long-term tracking, cyber security experts from Pangu Lab found that the active members of ATW are  engaged in programming and network engineer-related occupations and they are located in Switzerland, France, Poland, and Canada. 

China has itself been launching cyber attacks on both its allies and competitors, the countries targeted including Russia, US, Iran and S. Korea. In 2022 Chinese state-sponsored hacking group successfully compromised the computer networks of at least six US state governments.

These hacking attacks have been going on for some time by different countries against others. In 2021 the Biden administration organised a broad group of allies to condemn Beijing for cyber attacks around the world but stopped short of taking concrete punitive steps. 

Secretary of State Antony Blinken said at the time that China’s Ministry of State Security “has fostered an ecosystem of criminal contract hackers who carry out both state-sponsored activities and cyber crime for their own financial gain.” 

Global Times:    Mandiant:     ANINews:    NY Times:     Metro:    Kon Briefing:   CNBC:    NCSC:     

You Might Also Read: 

The NSA Hacked Huawei Long Ago:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Twitter Wants Users To Pay For 2FA
Cybersecurity & The New Space Race »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

World Privacy Forum (WPF)

World Privacy Forum (WPF)

The World Privacy Forum is a non-profit public interest research group that focuses on privacy and technology issues.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

Soracom

Soracom

Soracom offers secure, scalable, cloud-native connectivity developed specifically for the Internet of Things.

Inspirria Cloudtech

Inspirria Cloudtech

Inspirria Cloudtech is a specialized Cloud Technologies Services provider and Cloud Aggregator focused on executing cloud models for clients.

Cybeats Technologies

Cybeats Technologies

Cybeats delivers an integrated security platform designed to secure and protect high-valued connected devices.

EvoNexus

EvoNexus

EvoNexus is a technology startup incubator with locations in San Diego, Orange County, and Silicon Valley.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

Infinite Ranges

Infinite Ranges

Infinite Ranges delivers secure, comprehensive digital solutions by connecting experts with the best products and services for the digital age.

Let's Encrypt

Let's Encrypt

Let’s Encrypt is a free, automated, and open digital certificate authority, run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG).

TXOne Networks

TXOne Networks

TXOne Networks offer cybersecurity solutions to protect your industrial control systems to ensure their reliability and safety from cyberattacks.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

XONA Systems

XONA Systems

XONA is The Zero Trust user access platform for the OT enterprise. Secure operational access to critical systems - from anywhere.

Linx Security

Linx Security

The Linx Identity Security platform enables identity, security, and IT ops teams to finally control the whole identity lifecycle.