Suspected Chinese hackers who have haunted military and government targets for a generation have updated their malicious software tools to target diplomatic missions. The Ke3chang cyber-espionage group has been active since at least 2010, researchers say, gathering intelligence about international government contractors, military organizations and breached computers used by foreign ministries before the 2012 G20 Summit, according to FireEye. Now, there’s new evidence the group updated its tactics in a series of attacks aimed at diplomats in Belgium, Brazil, Chile, Guatemala, and Slovakia. Security specialists at the Slovakian antivirus company ESET published research Thursday demonstrating how the Ke3chang group used a technical backdoor, Okrum, and an updated version of the Ketrican malware. The hacking tools allow Ke3chang hackers to intercept information about victims, including their username, IP address, operating system and build number, their language and country name, and other communication. ESET’s research contains findings dating back to 2015, when […]
The post Active Chinese hacking campaign targeted diplomats from Slovakia, South America appeared first on CyberScoop.
Continue reading Active Chinese hacking campaign targeted diplomats from Slovakia, South America→