Chinese APT20 hacker group bypassing 2FA in latest attacks
It is pertinent to note that the Chinese state sponsored hacking group was said to be dormant for years
By : migrator
Update: 2019-12-23 09:25 GMT
Beijing
A Chinese state sponsored hacking group, APT20, has been found bypassing two-factor authentication (2FA) in a recent wave of attacks, security researchers at the Dutch cyber-security firm Fox-IT have warned.
Security researchers say they found evidence that the attacks have been attributed to a group which the cyber-security industry was tracking as APT20, believed to operate on the behest of the Beijing government.
The group's primary targets were government entities and managed service providers (MSPs). The government entities and MSPs were active in fields like aviation, healthcare, finance, insurance, energy, and even something as niche as gambling and physical locks, ZDNet reported on Monday.
It is pertinent to note that the Chinese state sponsored hacking group was said to be dormant for years.
While on the inside, Fox-IT said the group dumped passwords and looked for administrator accounts, in order to maximize their access.
A primary concern was obtaining virtual private network (VPN) credentials, so hackers could escalate access to more secure areas of a victim's infrastructure, or use the VPN accounts as more stable backdoors, the report added.
According to the researchers, the hackers would generally gain entry to an organisation's systems by exploiting a vulnerability on web servers that the company or government agency operated. They would then penetrate further to identify people, usually system administrators, with privileged access to the most sensitive parts of the computer network.
Visit news.dtnext.in to explore our interactive epaper!
Download the DT Next app for more exciting features!
Click here for iOS
Click here for Android