US News

US Federal Agencies Warn of Chinese Hackers Compromising Organizations in 70 Countries


Organizations are encouraged to regularly update their applications and software and to rectify known network vulnerabilities to avert such cyberattacks.

A ransomware group known as “Ghost” is taking advantage of network vulnerabilities within various organizations to infiltrate their systems, as indicated by a joint advisory from several U.S. federal agencies.

“Since early 2021, Ghost actors have been targeting victims whose internet-facing services are running outdated software and firmware versions,” noted the Cybersecurity and Infrastructure Security Agency (CISA) in the advisory issued on Feb. 19. “These actors, located in China, are engaged in extensive attacks for financial gain.”

The attacks have been aimed at schools and universities, government networks, critical infrastructure, as well as technology, manufacturing, and healthcare sectors, including numerous small and medium-sized enterprises.

“This indiscriminate targeting of vulnerable networks has resulted in the compromise of organizations across more than 70 countries, including those in China,” stated CISA, the FBI, and the Multi-State Information Sharing and Analysis Center in the advisory.

Ghost actors have also been identified by other aliases such as Cring, Crypt3r, HsHarada, Hello, Wickrme, Phantom, Rapture, and Strike.

The criminals exploit “common vulnerabilities and exposures” to gain unauthorized access to servers, utilizing publicly available code. They specifically target weaknesses in servers that run Adobe ColdFusion, Microsoft Exchange, and Microsoft SharePoint.

Threat actors utilize various tools to “collect passwords and/or password hashes to facilitate unauthorized logins and privilege escalation or to pivot to other victim devices,” the advisory indicated. Typically, these attackers spend only a few days within their targets’ networks.

The advisory suggests organizations remedy known network vulnerabilities promptly by implementing “timely security updates” for firmware, software, and operating systems.

It is essential for organizations to train users to recognize phishing attempts, as mentioned in the advisory. They should also identify, investigate, and alert regarding any instances of “abnormal network activity.”

“Regular system backups that are known to be good and stored offline or segmented from source systems should be maintained,” the advisory further noted.

“Victims of Ghost ransomware whose backups were unaffected by the attack were frequently able to restore operations without the need to engage with Ghost actors or pay any ransom.”

Chinese Pre-Positioning

The advisory is part of a broader initiative to combat ransomware threats.

CISA has previously alerted about the cybersecurity threats posed by China to the United States. Chinese state-sponsored cyber actors are attempting to position themselves within IT networks to execute “disruptive or destructive cyberattacks” on vital American infrastructure in the event of a conflict with Washington, as stated by the agency here.

Volt Typhoon, a Beijing-supported cyber actor, has successfully breached the IT networks of multiple critical infrastructure entities within sectors such as energy, transportation, communications, and water systems.

In November, CISA and the FBI provided details on a “broad and significant cyber espionage” operation executed by Chinese hackers that compromised the networks of U.S. telecommunications companies.

Hackers managed to steal customer call records and private communications from “a limited number of individuals primarily involved in government or political activities.”

Rep. Mark Green (R-Tenn.), chairman of the House Committee on Homeland Security, stated, “The Chinese Communist Party’s exploitation of vulnerabilities in major internet service providers is merely the latest alert as Beijing, Tehran, and Moscow strive to gain strategic advantages through cyber espionage, manipulation, and destruction.”



Source link

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.