News
The Chinese APT41 hacking group uses a new malware named 'ToughProgress' that abuses Google Calendar for command-and-control ...
Chinese state-sponsored threat actor APT41 has targeted government entities with malware that uses Google Calendar for ...
"When used together, CAV and crypting services allow criminals to obfuscate malware, making it undetectable and enabling ...
Google found Chinese hackers abusing Google Calendar The service was used to host malicious instructions and to exfiltrate ...
A new report reveals that Chinese state-backed hacking group APT41 has developed a novel method to conduct cyber-espionage by ...
The infection begins with spear-phishing emails that direct victims to a malicious ZIP archive hosted on a hijacked ...
Google revealed that APT41, a Chinese hacking group, used malware called TOUGHPROGRESS to spy on governments by hiding ...
Hosted on MSN10mon
China's APT41 crew adds a stealthy malware loader and fresh backdoor to its toolboxChinese government-backed cyber espionage gang APT41 has very likely added a loader dubbed DodgeBox and a backdoor named MoonWalk to its malware toolbox, according to cloud security service ...
APT41, a state-sponsored hacker group in the southwestern Chinese city of Chengdu, is believed to be behind the attack, the outlet reported. And it’s likely they stole more than officials even ...
The hacking group the Secret Service blamed for the activity is known to the cybersecurity industry as APT41 and has for years allegedly conducted espionage on behalf of the Chinese government ...
The Chinese state-backed APT41 hacking group is targeting Android devices with two newly discovered spyware strains dubbed WyrmSpy and DragonEgg by Lookout security researchers. APT41 is one of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results