April 04, 2026 12:52 am (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
AAP drops Raghav Chadha from key parliamentary role, sparks buzz over internal rift | Amit Shah to camp in West Bengal for 15 days during Assembly polls; predicts Mamata’s defeat in state and Bhabanipur | 'BJP plotting President’s Rule, don’t fall in the trap': Mamata Banerjee on Malda unrest, urges peace | 'Most polarised state': CJI Kant raps Bengal govt over 9-hour hostage of judicial officers | Bengal SIR protest: Judge pleads for help amid mob attack after 9-hour hostage ordeal | Bengal SIR progress: 47 lakh of 60 lakh adjudicated cases disposed of, Supreme Court informed | Amit Shah to join Suvendu Adhikari on Bhabanipur nomination day; BJP plans mega roadshow | Fuel prices rise: Premium petrol, diesel hiked amid oil price surge | Commercial LPG up Rs 195.50 as global oil prices rise; domestic rates unchanged | Layoff alert: Oracle cuts 30,000 jobs globally, 12,000 hit in India
China
Photo Courtesy: Unsplash

Australian government accuses China-backed hacker group of stealing passwords, usernames from unnamed networks

| @indiablooms | Jul 10, 2024, at 04:06 pm

The Australian Cyber Security Centre has alleged that cyber security firms backed by Chinese authorities stole passwords and usernames from unnamed Australian networks in 2022.

"The PRC state-sponsored cyber group has previously targeted organisations in various countries, including Australia and the United States, and the techniques highlighted below are regularly used by other PRC state-sponsored actors globally. Therefore, the authoring agencies believe the group, and similar techniques remain a threat to their countries’ networks as well," the advisory issued by the Australian Cyber Security Centre.

"This group has previously been reported as being based in Haikou, Hainan Province, PRC and receiving tasking from the PRC MSS, Hainan State Security Department," the advisory said.

In the activity summer, the report said  APT40 has repeatedly targeted Australian networks as well as government and private sector networks in the region, and the threat they pose to our networks is ongoing.

"The tradecraft described in this advisory is regularly observed against Australian networks," the advisory said.

APT40 possesses the capability to rapidly transform and adapt exploit proof-of-concept(s) (POCs) of new vulnerabilities and immediately utilise them against target networks possessing the infrastructure of the associated vulnerability.

APT40 regularly conducts reconnaissance against networks of interest, including networks in the authoring agencies’ countries, looking for opportunities to compromise its targets.

This regular reconnaissance postures the group to identify vulnerable, end-of-life or no longer maintained devices on networks of interest, and to rapidly deploy exploits.

The report said APT40 continues to find success exploiting vulnerabilities from as early as 2017.

"This report details the findings of the ASD’s ACSC investigation into the successful compromise of the organisation’s network between July and September 2022," the advisory said.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.