HomeCyber BalkansChina accuses US of cyber espionage during the Asian Winter Games, identifies...

China accuses US of cyber espionage during the Asian Winter Games, identifies 3 NSA agents

Published on

spot_img

Chinese technical teams have recently uncovered a concerning discovery involving unknown encrypted data packets being transmitted to specific devices running Microsoft Windows operating systems within the province. These encrypted packets were believed to be potential attempts to activate or trigger pre-implanted backdoors within the Windows systems, as reported by Xinhua.

The National Computer Virus Emergency Response Center (NCVERC) released a report detailing a deliberate and coordinated campaign targeting the information systems of the recently held Games. The report highlighted that between January 26 and February 14, 2025, the Games’ information systems endured a total of 270,167 attacks from sources outside the country, with a significant surge in activity occurring on February 8, just a day after the formal opening of the event. Of these attacks, a staggering 170,864 (63.24%) were traced back to IP addresses based in the United States.

The cyber onslaught primarily focused on compromising the integrity of the event’s crucial systems, including the Information Service System, Arrival and Departure Management System, and Charging Card System. Various attack methods were employed, ranging from arbitrary file read vulnerabilities and SQL injection to spoofed HTTP headers, mass port scans, and vulnerability exploitation, the report elaborated.

Furthermore, the report underlined the severity and breadth of these attacks, painting a picture of a highly organized and intentional effort to disrupt the operations of the Games and potentially compromise sensitive information stored within the systems.

The revelation of these malicious activities has sent shockwaves through the cybersecurity community, raising concerns about the increasing sophistication and brazenness of cyber attackers targeting high-profile events and critical infrastructure. The fact that a significant portion of the attacks originated from US-based IP addresses has further fueled speculations and discussions about potential geopolitical motivations behind the cyber campaign.

Experts and analysts have emphasized the importance of enhancing cybersecurity measures, investing in advanced threat detection capabilities, and fostering international cooperation to combat such cyber threats effectively. The incident serves as a stark reminder of the ever-evolving nature of cybersecurity challenges in an interconnected and digitized world, where the stakes are high and the consequences of a successful cyberattack can be devastating.

As investigations continue and efforts to mitigate the impact of these attacks intensify, the focus remains on fortifying defenses, identifying vulnerabilities, and staying vigilant in the face of emerging cyber threats. The incident serves as a wake-up call for governments, organizations, and individuals alike to prioritize cybersecurity and adopt a proactive approach to safeguarding systems and data from malicious actors seeking to exploit weaknesses for their gain.

Source link

Latest articles

GraphWorm Malware Utilizes OneDrive for Command and Control

New Threat Emerges: Webworm Utilizes Microsoft's OneDrive for Malicious Activities A rapidly evolving cyber threat...

Hackers Exploit F5 BIG-IP for SSH Access and Lateral Movement into Linux Networks

Cybersecurity Concerns Rise as Threat Actors Exploit F5 BIG-IP Appliances Recent reports reveal a significant...

TAX#TRIDENT Campaign Distributes Windows Malware

Beware of a New Malware Campaign Targeting Windows Users: TAX#TRIDENT A concerning new malware campaign...

Hackers Exploit SEO Poisoning to Create Fake Gemini CLI and Claude Installers

Financial Threat Actors Target AI Developers with Sophisticated Infostealer Campaign In a concerning turn of...

More like this

GraphWorm Malware Utilizes OneDrive for Command and Control

New Threat Emerges: Webworm Utilizes Microsoft's OneDrive for Malicious Activities A rapidly evolving cyber threat...

Hackers Exploit F5 BIG-IP for SSH Access and Lateral Movement into Linux Networks

Cybersecurity Concerns Rise as Threat Actors Exploit F5 BIG-IP Appliances Recent reports reveal a significant...

TAX#TRIDENT Campaign Distributes Windows Malware

Beware of a New Malware Campaign Targeting Windows Users: TAX#TRIDENT A concerning new malware campaign...