<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/">

<channel>
	<title>Cyber Espionage | Business Upturn</title>
	<atom:link href="https://www.businessupturn.com/news/topic/cyber-espionage/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.businessupturn.com</link>
	<description>India&#039;s leading business and financial news portal — markets, economy, stocks and corporate news.</description>
	<lastBuildDate>Thu, 29 Feb 2024 02:57:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.businessupturn.com/wp-content/uploads/2023/07/favicon-150x150.jpg</url>
	<title>Cyber Espionage | Business Upturn</title>
	<link>https://www.businessupturn.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Chinese cyberspies deploy new malware in Ivanti VPN attacks</title>
		<link>https://www.businessupturn.com/technology/cyber-security/chinese-cyberspies-deploy-new-malware-in-ivanti-vpn-attacks/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Thu, 29 Feb 2024 02:57:05 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=404644</guid>

					<description><![CDATA[Chinese cyberespionage actors exploited Ivanti VPN vulnerabilities, deployed new malware for persistence, and showcased advanced techniques, highlighting the need for vigilance and timely patching.]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:375&quot;&gt;A recent report by cybersecurity firm Mandiant has shed light on a campaign by suspected Chinese cyberespionage actors targeting Ivanti Connect Secure VPN appliances. These actors have been exploiting vulnerabilities in the software to gain unauthorized access to victim networks and deploy new malware designed to maintain their presence even after system updates or resets.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:448&quot;&gt;The vulnerabilities in question were first disclosed in December 2023 and were patched by Ivanti in January 2024. However, attackers continued to exploit one of the vulnerabilities (CVE-2024-21893) by deploying a new set of malware tools. This malware, is identified as LittleLamb.WoolTea, PitStop, Pitdog, PitJet, and PitHook, allow the attackers to establish persistence on compromised systems, making it more challenging to remove them completely.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:414&quot;&gt;Mandiant attributes this campaign to a group known as UNC5325, which they believe is linked to another Chinese cyberespionage group, UNC3886. UNC3886 has a history of targeting vulnerable VMware products to gain access to victim networks. Both groups are suspected of primarily targeting organizations in the defense, technology, and telecommunication sectors located in the United States and Asia-Pacific regions.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:755&quot;&gt;The attackers demonstrated a sophisticated understanding of the Ivanti VPN appliances, employing various techniques to maintain access after gaining initial entry. This included chaining vulnerabilities, deploying web shells like BushWalk, and even modifying open-source tools and built-in Ivanti utilities to evade detection. In some instances, they attempted to exploit the SparkGateway component, a legitimate remote access plugin, by deploying malicious plugins like PitFuel and PitDog. These plugins aimed to inject backdoors and persist across system updates, patches, and even factory resets. However, these attempts were ultimately unsuccessful due to differences in encryption keys between the factory reset kernel and the running kernel version.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:393&quot;&gt;Mandiant’s findings highlight the evolving capabilities of suspected Chinese cyberespionage actors and their continued efforts to exploit vulnerabilities in critical infrastructure. The use of novel malware and persistence techniques underscores the importance of timely patching vulnerabilities, implementing robust security controls, and maintaining vigilance against evolving cyber threats.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Chinese-cyberspies-deploy-new-malware-in-Ivanti-VPN-attacks.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Chinese cyberspies deploy new malware in Ivanti VPN attacks]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Chinese-cyberspies-deploy-new-malware-in-Ivanti-VPN-attacks.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Fake hostage site used in Israeli cyberattack</title>
		<link>https://www.businessupturn.com/technology/cyber-security/fake-hostage-site-used-in-israeli-cyberattack/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Thu, 29 Feb 2024 02:57:05 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=404656</guid>

					<description><![CDATA[Iranian hackers launched cyber attacks against Israel using a fake hostage website and other deceptive tactics.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;In a recent revelation by the cybersecurity firm Mandiant, a sophisticated cyber espionage campaign originating from Iranian hackers has come to light. This campaign, attributed to the hacker group known as UNC1546 or Tortoiseshell, is allegedly closely associated with Iran’s Islamic Revolutionary Guard Corps (IRGC).&lt;/p&gt;
&lt;p&gt;The crux of this campaign revolves around the creation of a deceptive website purportedly advocating for the release of Israeli hostages held by Hamas. However, instead of serving its stated humanitarian purpose, this site has been utilized as a platform for launching cyber attacks against Israeli targets. Under the guise of the “Bring Them Home Now” movement, which ostensibly seeks the return of the hostages, the hackers deployed malware named MINIBUS. Disguised as an application related to the hostages, unsuspecting users who installed it inadvertently triggered a decoy designed to infiltrate their systems.&lt;/p&gt;
&lt;p&gt;The modus operandi of the UNC1546 hackers extends beyond the fabrication of a fake hostage support site. In one instance, they employed a quiz application as a decoy for spreading the MINIBUS malware. Furthermore, the group utilized deceptive tactics such as circulating false job offers in the defense and technology sectors, embedding malicious payloads within the links shared.&lt;/p&gt;
&lt;p&gt;The scope of their cyber activities transcends the Israeli context, encompassing targeted attacks on entities within the Middle Eastern aerospace, aviation, and defense industries. While Israel and the United Arab Emirates are confirmed targets, other nations like Turkey, India, and Albania are identified as potential targets, raising concerns about the broader regional implications of this cyber campaign.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Fake-hostage-site-used-in-Israeli-cyberattack.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Fake hostage site used in Israeli cyberattack]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Fake-hostage-site-used-in-Israeli-cyberattack.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Leaked documents expose China’s cyber espionage network</title>
		<link>https://www.businessupturn.com/technology/cyber-security/leaked-documents-expose-chinas-cyber-espionage-network/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Fri, 23 Feb 2024 16:44:29 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Vigilance]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=402350</guid>

					<description><![CDATA[A massive leak of data from I-Soon, a Chinese tech security firm, has exposed details of China&apos;s cyber espionage operations.]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:415&quot;&gt;The revelation of a massive data leak from I-Soon, a Chinese tech security firm deeply intertwined with the country’s government agencies. This unprecedented breach offered a startling glimpse into the inner workings of China’s cyber espionage apparatus, raising serious concerns about global security and the extent of state-sponsored hacking activities.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:403&quot;&gt;The leaked data, encompassing contracts, marketing materials, product manuals, and personnel lists, painted a disturbing picture of I-Soon’s involvement in a wide range of activities. From large-scale surveillance of overseas dissidents to targeted hacking campaigns against foreign nations, the documents laid bare the methods employed by Chinese authorities to exert influence and gather intelligence.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:476&quot;&gt;One particularly concerning aspect of the leak was the revelation of I-Soon’s role in hacking networks across Central and Southeast Asia, as well as Hong Kong and Taiwan. The leaked documents detailed sophisticated tools used to unmask users on social media platforms, infiltrate email accounts, and mask the online activities of Chinese agents operating abroad. This ability to operate with near impunity highlights the sophistication and reach of China’s cyber capabilities.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:467&quot;&gt;Furthermore, the leak shed light on the competitive landscape of state-sponsored hacking. Documents revealed how government targeting requirements fueled a marketplace of independent contractor hackers-for-hire, with I-Soon acting as a key player in this ecosystem. This revelation underscores the potential for such activities to become increasingly decentralized and difficult to track, posing a significant challenge for international efforts to combat cybercrime.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:555&quot;&gt;The impact of this leak is multifaceted. On one hand, it has severely damaged I-Soon’s reputation, exposing the company’s close ties to the Chinese government and raising ethical questions about its activities. On another hand, it has provided invaluable insights for the cybersecurity community, offering a rare opportunity to understand the inner workings of a state-affiliated hacking contractor. This knowledge can be used to improve attribution efforts, develop more effective defence strategies, and raise awareness of the evolving threat landscape.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:555&quot;&gt;The source of the leak remains unknown. Regardless of its origin, the leak has sparked a global conversation about the ethical implications of state-sponsored hacking and the need for international cooperation to address this growing threat. While the investigation into the leak’s authenticity continues, its credibility has been widely acknowledged by cybersecurity experts, further amplifying its significance.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Leaked-documents-expose-Chinas-cyber-espionage-network.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Leaked documents expose China’s cyber espionage network]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Leaked-documents-expose-Chinas-cyber-espionage-network.jpg" width="1200" height="675" />
	</item>
	</channel>
</rss>
