Asian Cyber Espionage Campaign Hit 37 Countries
Briefly

Asian Cyber Espionage Campaign Hit 37 Countries
"A sprawling cyber espionage campaign linked to an Asian state-aligned hacking group has compromised government agencies and critical infrastructure in 37 countries. Palo Alto Networks noted that the activity affected at least 70 organizations over the past year, including ministries responsible for trade, energy, finance, border control, and diplomacy. Security researchers say the scale and economic focus of the operation are striking, with attackers appearing to collect intelligence tied to rare earth minerals, trade negotiations, and geopolitical relationships."
"According to Cybersecurity Dive, Palo Alto Networks said that the campaign was the most wide-reaching cyberespionage operation attributed to a single government hacking group since the 2020 SolarWinds breach. The company tracked the activity as TGR-STA-1030 and described it as operating out of Asia, without naming a specific government. "It's methods, targets, and scale of operations are alarming, with potential long-term consequences for national security and key services," the report explained."
"Axios noted that the attackers successfully breached five national law enforcement and border control agencies, three ministries of finance, and several other government agencies tied to diplomacy, trade, and natural resources. Identified victims included the following: Brazil's Ministry of Mines and Energy The parliament and army of the Czech Republic A Mongolian police agency An Indonesian government official A Taiwanese power equipment supplier National-level telecommunications companies"
A sprawling cyber espionage campaign linked to an Asian state-aligned hacking group compromised government agencies and critical infrastructure across 37 countries and at least 70 organizations over the past year. Targeted entities included ministries responsible for trade, energy, finance, border control, diplomacy, national telecoms, and suppliers of power equipment. Attackers appeared to collect economic and geopolitical intelligence tied to rare earth minerals and trade negotiations. The operation, tracked as TGR-STA-1030, was described as operating out of Asia and compared in breadth to the 2020 SolarWinds breach. Several national law enforcement, border control, and finance ministries were breached; US and UK agencies were reported unaffected.
Read at TechRepublic
Unable to calculate read time
[
|
]