Saturday, October 31, 2020
Home Lead Story Chinese APT20 Hacker Group Bypassing 2FA in Latest Attacks

Chinese APT20 Hacker Group Bypassing 2FA in Latest Attacks

A primary concern was obtaining virtual private network (VPN) credentials, so hackers could escalate access to more secure areas of a victim's infrastructure, or use the VPN accounts as more stable backdoors, the report added

A Chinese state sponsored hacking group, APT20, has been found bypassing two-factor authentication (2FA) in a recent wave of attacks, security researchers at the Dutch cyber-security firm Fox-IT have warned.

Security researchers say they found evidence that the attacks have been attributed to a group which the cyber-security industry was tracking as APT20, believed to operate on the behest of the Beijing government.

The group’s primary targets were government entities and managed service providers (MSPs). The government entities and MSPs were active in fields like aviation, healthcare, finance, insurance, energy, and even something as niche as gambling and physical locks, ZDNet reported on Monday.

Florida, Ransom, Cybercriminals
A laptop displays a message after being infected by ransomware as part of a worldwide cyberattack on June 27, 2017 in Geldrop, Netherlands. (Representational image). VOA

It is pertinent to note that the Chinese state sponsored hacking group was said to be dormant for years.

While on the inside, Fox-IT said the group dumped passwords and looked for administrator accounts, in order to maximise their access.

Also Read: Break up Jeff Bezos’ Empire, Says Amazon’s 2nd Employee

A primary concern was obtaining virtual private network (VPN) credentials, so hackers could escalate access to more secure areas of a victim’s infrastructure, or use the VPN accounts as more stable backdoors, the report added.

According to the researchers, the hackers would generally gain entry to an organisation’s systems by exploiting a vulnerability on web servers that the company or government agency operated. They would then penetrate further to identify people, usually system administrators, with privileged access to the most sensitive parts of the computer network. (IANS)

STAY CONNECTED

19,120FansLike
362FollowersFollow
1,778FollowersFollow

Most Popular

Ashtottaram‌ ‌22‌: OṀ ṚISHIBHŨMYAI NAMAH

Ashtottaram 22 22) OṀ ṚISHIBHŨMYAI NAMAH:                       OṀ (AUM)-ṚI-SHI- BHOO-MYAI--NA-MA-HA                                                 ॐ ऋषिभूम्यै नमः       (Ṛishi: A person of wisdom) Rishi is a word used in many Hindu scriptures. A simple translation of...

Menstrual Dysfunction Prevalent in Young Athletes

Researchers, including one of Indian-origin, have found that menstrual dysfunction is more prevalent in young athletes than among non-athletes of a similar age. The study,...

Spinning Keeps You Energized and Your Mind Focused

One of the most popular cardio work-outs in North America, Latin America, Europe, and other parts of Asia, and a current global phenomenon, rhythm-based...

Change in Indian Healthcare Industry is Need of the Hour

With all the chaos created due to the pandemic, a change in the Indian healthcare industry is the need of the hour, feels Anita...

Food Habits to Follow if You Have Arthritis

Arthritis is an autoimmune disease that affects joint and bone pain. It could be a problem or a matter of concern, If not taken...

New Mask Aiming to Make Wearer Less Infectious

People wear face masks to protect others -- not merely to protect themselves. With this in mind, researchers have developed a new concept for...

Cognitive Disorders Increase Risks of Developing Severe COVID

Researchers have claimed that dementia and other cognitive disorders now appear to be the risk factors for developing severe COVID-19. The findings, published in the...

Localized Content Driving New Customers in Amazon Prime Video

Riding on localized content being churned out in countries like India, the number of Prime members who stream Prime Video grew by more than...

Recent Comments