More examples of hacking based warfare.
Chinese Hackers Tried to Steal Russian Defense Data
By The New York Times, May 20, 2022
The emails landed on March 23 in the inboxes of scientists and engineers at several of Russia's military research and development institutes, purportedly sent by Russia's Ministry of Health. They carried a subject line that offered seemingly tantalizing information about a "list of persons under U.S. sanctions for invading Ukraine."
But the emails were actually sent by state-sponsored hackers in China seeking to entice their Russian targets to download and open a document with malware, according to a new report to be released Thursday by the Israeli-American cybersecurity firm Check Point.
The report provides new evidence of Chinese efforts to spy on Russia, pointing to the complexity of the relations between two countries that have drawn closer in solidarity against the United States. It also underscores the sprawling, and increasingly sophisticated, tactics China's cyberspies have used to collect information on an ever-expanding array of targets, including countries it considers friends, like Russia. ;
The emails landed on March 23 in the inboxes of scientists and engineers at several of Russia's military research and development institutes, purportedly sent by Russia's Ministry of Health. They carried a subject line that offered seemingly tantalizing information about a "list of persons under U.S. sanctions for invading Ukraine."
But the emails were actually sent by state-sponsored hackers in China seeking to entice their Russian targets to download and open a document with malware, according to a new report to be released Thursday by the Israeli-American cybersecurity firm Check Point. ... '
The report provides new evidence of Chinese efforts to spy on Russia, pointing to the complexity of the relations between two countries that have drawn closer in solidarity against the United States. It also underscores the sprawling, and increasingly sophisticated, tactics China's cyberspies have used to collect information on an ever-expanding array of targets, including countries it considers friends, like Russia ...'
No comments:
Post a Comment