{"id":7232,"date":"2017-04-04T19:20:53","date_gmt":"2017-04-05T03:20:53","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/04\/news-1023\/"},"modified":"2017-04-04T19:20:53","modified_gmt":"2017-04-05T03:20:53","slug":"news-1023","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/04\/04\/news-1023\/","title":{"rendered":"Chinese hackers go after third-party IT suppliers to steal data"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt3.staticworld.net\/images\/article\/2016\/11\/hacking-1685092-100696508-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Michael Kan| Date: Tue, 04 Apr 2017 14:52:00 -0700<\/strong><\/p>\n<p>Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers.\u00a0<\/p>\n<p>Major IT suppliers that specialize in cloud storage, help desk, and application management have become a top target for the hacking group known as APT10, security providers BAE Systems and PwC said in a <a href=\"https:\/\/www.pwc.co.uk\/cyber-security\/pdf\/cloud-hopper-report-final-updated.pdf\">joint report<\/a>.<\/p>\n<p>That&#8217;s because these suppliers often have direct access to their client&#8217;s networks. APT10 has been found stealing intellectual property as part of a global cyberespionage campaign that ramped up last year, PwC <a href=\"http:\/\/pwc.blogs.com\/press_room\/2017\/04\/pwc-collaborates-with-public-and-private-sector-partners-to-uncover-new-sustained-global-cyber-espio.html\">said<\/a> on Monday.<\/p>\n<p>The joint report doesn&#8217;t identify which IT service providers were hit or how many were found breached. But the providers included several suppliers in enterprise services and cloud hosting.<\/p>\n<p>&#8220;It is impossible to say how many organizations might be impacted altogether at this point,&#8221; BAE Systems <a href=\"http:\/\/baesystemsai.blogspot.com\/2017\/04\/apt10-operation-cloud-hopper_3.html\">said<\/a>\u00a0in a blog post.<\/p>\n<p>APT10 has been around since at least 2009 and is believed to be based in China, according to security researchers. To kick off their attacks, the hackers have used <a href=\"http:\/\/www.pcworld.com\/article\/229444\/spear_phishing_more_than_spam_its_espionage.html\">spear-phishing<\/a> email schemes to trick their victims into installing malware, either through an attachment or through a link that leads to a malicious site.<\/p>\n<p>Countries targeted by APT10.<\/p>\n<p>From there, APT10 will try to steal the credentials from the IT service provider to hop over to their clients&#8217; private networks. The hackers will then move on to intellectual property theft, by using the IT service provider&#8217;s own infrastructure to secretly exfiltrate the data. \u00a0\u00a0\u00a0<\/p>\n<p>APT10&#8217;s hacking campaign has continued into this year. The group has targeted a whole range of industries across the globe including retail, energy, technology, and the public sector.<\/p>\n<p>The UK&#8217;s National Cyber Security Centre has warned the public about the hacking campaign.<\/p>\n<p>\u201cThis incident should remind organizations that entire supply chains need to be managed, and they cannot outsource their risk,\u201d it <a href=\"https:\/\/www.ncsc.gov.uk\/news\/advice-managing-enterprise-security-published-after-major-cyber-campaign-detected\">said<\/a> in a statement.<\/p>\n<p>Businesses should talk with IT service providers about how they protect access to their data and demand any changes needed, the UK center recommended. \u00a0<\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3187578\/security\/chinese-hackers-go-after-third-party-it-suppliers-to-steal-data.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt3.staticworld.net\/images\/article\/2016\/11\/hacking-1685092-100696508-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Michael Kan| Date: Tue, 04 Apr 2017 14:52:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers.\u00a0<\/p>\n<p>Major IT suppliers that specialize in cloud storage, help desk, and application management have become a top target for the hacking group known as APT10, security providers BAE Systems and PwC said in a <a href=\"https:\/\/www.pwc.co.uk\/cyber-security\/pdf\/cloud-hopper-report-final-updated.pdf\">joint report<\/a>.<\/p>\n<p>That&#8217;s because these suppliers often have direct access to their client&#8217;s networks. APT10 has been found stealing intellectual property as part of a global cyberespionage campaign that ramped up last year, PwC <a href=\"http:\/\/pwc.blogs.com\/press_room\/2017\/04\/pwc-collaborates-with-public-and-private-sector-partners-to-uncover-new-sustained-global-cyber-espio.html\">said<\/a> on Monday.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3187578\/security\/chinese-hackers-go-after-third-party-it-suppliers-to-steal-data.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11072,714],"class_list":["post-7232","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-cybercrime-hacking","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7232"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7232\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7232"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}