cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Caute_cautim
Community Champion

Chinese Stealth attacks and capabilities

Hi All

 

An interesting report from Mandiant, which may be of interest to the community.

 

Mandiant Intelligence is tracking several ways in which Chinese cyber espionage activity has increasingly leveraged initial access and post-compromise strategies intended to minimize opportunities for detection. Specifically, this analysis highlights Chinese threat groups’ exploitation of zero-days in security, networking, and virtualization software, and targeting of routers and other methods to relay and disguise attacker traffic both outside and inside victim networks. We assess with high confidence that Chinese cyber espionage groups are using these techniques to avoid detection and complicate attribution

 

https://www.mandiant.com/resources/blog/chinese-espionage-tactics

 

Regards

 

Caute_Cautim

 

Regards

 

Caute_Cautim

 

 

0 Replies