![]() Targets and victims include dozens of technology and manufacturing companies, primarily from East Asia, Western Europe, and North America. “The attackers targeted intellectual property developed by the victims, including sensitive documents, blueprints, diagrams, formulas, and manufacturing-related proprietary data,” wrote the Cybereason Nocturnus Incident Response Team. Winnti’s goal is to siphon off proprietary information, trade secrets, R&D documents, source code and blueprints for various technologies, etc. The group, however, has existed since 2010. ![]() It is unclear if the cyber espionage campaign precedes 2019. Such is the persistence of Operation CuckooBees that the malicious campaign has remained undetected since at least 2019. was fretting over, i.e., the theft and outflux of intellectual property developed in the country.Ĭybereason attributed the sophisticated cyber espionage campaign, dubbed Operation CuckooBees, to the Winnti Advanced Persistent Threat (APT) group with “moderate-to-high confidence.” Also known as APT41, BARIUM, and Blackfly, the group is notorious for stealing proprietary information and is believed to be associated with the Chinese state. The cybersecurity company’s findings yet again substantiate what the U.S. Security researchers at Cybereason on Wednesday disclosed the existence of a cyber espionage campaign conducted by Chinese threat actors. Members of the group were previously indicted for stealing intellectual property information from U.S. ![]() Boston-based cybersecurity company Cybereason has uncovered a massive and long-running cyber espionage campaign, dubbed Operation CuckooBees, carried out by China’s Winnti APT group. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |