Advertisement
UK markets closed
  • FTSE 100

    8,139.83
    +60.97 (+0.75%)
     
  • FTSE 250

    19,824.16
    +222.18 (+1.13%)
     
  • AIM

    755.28
    +2.16 (+0.29%)
     
  • GBP/EUR

    1.1673
    +0.0017 (+0.14%)
     
  • GBP/USD

    1.2487
    -0.0024 (-0.19%)
     
  • Bitcoin GBP

    51,005.50
    -374.04 (-0.73%)
     
  • CMC Crypto 200

    1,325.92
    -70.61 (-5.06%)
     
  • S&P 500

    5,106.75
    +58.33 (+1.16%)
     
  • DOW

    38,283.81
    +198.01 (+0.52%)
     
  • CRUDE OIL

    84.04
    +0.47 (+0.56%)
     
  • GOLD FUTURES

    2,348.00
    +5.50 (+0.23%)
     
  • NIKKEI 225

    37,934.76
    +306.28 (+0.81%)
     
  • HANG SENG

    17,651.15
    +366.61 (+2.12%)
     
  • DAX

    18,161.01
    +243.73 (+1.36%)
     
  • CAC 40

    8,088.24
    +71.59 (+0.89%)
     

Chinese Hacking Group Undetected For Decade

A Chinese state-backed hacking group has been stealing information from foreign companies and journalists for more than a decade undetected, it is claimed.

US cybersecurity company FireEye (NasdaqGS: FEYE - news) says the group has even managed to carry out sophisticated attacks on networks which are not connected to the internet.

The details were published in a report on Monday and reveals that the group - known as APT30 - has been operating since 2004.

FireEye's chief technology officer Bryce Boland said he believes China is behind APT30, saying it had stolen information "about journalists, dissidents and political developments in relation to China targeting government and military organisations, and targeting economic sectors of interest to China’s economy".

ADVERTISEMENT

The victims of the group's attacks have not been named for security reasons but are based in Asia.

The group infected victims' computers by sending emails to their targets from a supposedly trusted source.

Once opened, the emails installed malware called Mysterious Eagle onto the computers which could be controlled and monitored remotely.

The software is written to be operated by Chinese-language users and managed to infiltrate secure networks which are not connected to the internet by infecting USB drives which are transferred between machines.

Mr Boland told the Financial Times: "That shows the sophistication in targeting the more sensitive government networks, and particularly military and non-internet connected networks.

"The capability to attack air-gapped networks is not unique but it is certainly not common."