article thumbnail

China-linked APT BlackTech was spotted hiding in Cisco router firmware

Security Affairs

US and Japanese authorities warn that a China-linked APT BlackTech planted backdoor in Cisco router firmware to hack the businesses in both countries. The group targeted organizations in multiple sectors, including defense, government, electronics, telecommunication, technology, media, telecommunication industries.

Firmware 111
article thumbnail

MI5 chief warns of Chinese cyber espionage reached an unprecedented scale

Security Affairs

“If you’re working today at the cutting edge of technology then geopolitics is interested in you, even if you’re not interested in geopolitics.” ” Commercial businesses in the technology sector of any size, especially small companies and start-ups and researchers, are more exposed to Chinese espionage. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3.5m IP cameras exposed, with US in the lead

Security Affairs

And while cosmetic security measures are in place, security leaders have long warned that technologies produced by Chinese companies can be exploited by China’s government. Most analyzed brands (96.44% of the discovered cameras) force users to set passwords or generate unique default passwords on the newest models and firmware versions.

article thumbnail

Lapsus$: The New Name in Ransomware Gangs

Security Boulevard

Other targets include Brazil’s Ministry of Health (MoH) and Brazilian telecommunications operator Claro. Since they appear to be succeeding, Lapsus$ announced that they are looking to recruit insiders employed at telecommunications, software and gaming companies, among other technology businesses. But first things first.

article thumbnail

What is a Managed Security Service Provider? MSSPs Explained

eSecurity Planet

History of MSSPs As internet service providers (ISPs) and telecommunications companies (telecoms) began offering commercial access to the internet in the late 1990s, they began to also offer firewall appliances and associated managed services. and installed software (operating systems, applications, firmware, etc.). Outsourcing U.S.

article thumbnail

Episode 167: Made in America? Trade Tensions highlight Supply Chain Risk

The Security Ledger

That decision followed years of warnings from security professionals about security vulnerabilities, back door accounts and suspicious patterns of behavior from cameras and other technology manufactured in the People Republic of China. Terry is a former NSA employee who specializes in firmware security. agencies.

Risk 40
article thumbnail

Sunburst: connecting the dots in the DNS requests

SecureList

Other advanced threat groups are also known to adopt similar strategies, for instance with hardware or firmware implants, which “sleep” for weeks or months before connecting to their C2 infrastructure. This explains why this attack was so hard to spot. Low-level details. All we need is a.NET decompiler (dnSpy is a good one).

DNS 74