

His visit had initially been planned for early this year but was postponed indefinitely after the discovery and shootdown of what the U.S. Secretary of State Antony Blinken departing for China this weekend as part of the Biden administration’s push to repair deteriorating ties between Washington and Beijing. The group then “countered with high frequency operations targeting a number of victims located in at least 16 different countries.” The hack was so severe the California company recommended fully replacing the appliances.Īfter discovering it in mid-May, Barracuda released containment and remediation patches but the hacking group, which Mandiant identifies as UNC4841, altered their malware to try to maintain access, Mandiant said. Mandiant said the majority impact in the Americas may partially reflect the geography of Barracuda’s customer base.īarracuda announced on June 6 that some of its its email security appliances had been hacked as early as October, giving the intruders a back door into compromised networks. Of those organizations, 55% were from the Americas, 22% from Asia Pacific and 24% from Europe, the Middle East and Africa and they included foreign ministries in Southeast Asia, foreign trade offices and academic organizations in Taiwan and Hong Kong. The hackers sent emails containing malicious file attachments to gain access to targeted organizations’ devices and data, Mandiant said.
CHINA SPORTS TAPE SOFTWARE
In a blog post Thursday, Google-owned Mandiant expressed “high confidence” that the group exploiting a software vulnerability in Barracuda Networks’ Email Security Gateway was engaged in “espionage activity in support of the People’s Republic of China.” It said the activivity began as early as October. That hack compromised tens of thousands of computers globally. “This is the broadest cyber espionage campaign known to be conducted by a China-nexus threat actor since the mass exploitation of Microsoft Exchange in early 2021,” Charles Carmakal, Mandiant’s chief technical officer, said in a emailed statement. Suspected state-backed Chinese hackers used a security hole in a popular email security appliance to break into the networks of hundreds of public and private sector organizations globally, nearly a third of them government agencies including foreign ministries, the cybersecurity firm Mandiant said Thursday.
