Originally, CoolClient was able to profile and gather system and user details, and record keystrokes. It allowed Mustang panda to upload and delete files, run TCP tunneling and reverse-prosy listening ...
China-linked Mustang Panda used updated COOLCLIENT malware in 2025 espionage to steal data from government and telecom ...
This combination, along with other factors such as infrastructure and technical overlaps, helped the security sleuths ...
Daily Express US on MSN
China-based espionage group targets US government with Venezuela phishing lures
A cyberespionage group with links to China reportedly targeted U.S. government officials with phishing emails related to ...
A China-linked hacking group has targeted European diplomatic networks — including Hungarian systems — in a coordinated cyber-espionage campaign this autumn. The attackers exploited a recently ...
Incident responders at Arctic Wolf Labs discovered an active cyber-espionage campaign they attributed to a China-affiliated threat actor tracked as UNC6384. In August, Google spotlighted a nearly ...
A remote access Trojan that's a staple of Chinese nation-state hacking is part of an ongoing campaign targeting telecom and manufacturing sectors in Central and South Asian countries. Researchers at ...
A remote access Trojan that's a staple of Chinese nation-state hacking is part of an ongoing campaign targeting telecom and manufacturing sectors in Central and South Asian countries. See Also: ...
A previously unknown hacking group has been spotted targeting European healthcare organizations using spyware linked to Chinese state-backed hackers and a new ransomware strain, researchers said. The ...
China-linked cyberespionage toolkits are popping up in ransomware attacks, forcing defenders to rethink how they combat state-backed hackers. China-linked APT espionage tools are starting to appear in ...
There’s a growing collaboration between hacking groups engaging in espionage on behalf of nation-states and those seeking financial gains through ransomware and other forms of cybercrime, researchers ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results