Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Chinese Hackers Broaden Targets to European Organizations
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Chinese Hackers Broaden Targets to European Organizations

Highlights

  • Chinese hackers are targeting EU organizations using legitimate VPN tools.

  • ESET reports enhanced stealth tactics by groups like MirrorFace.

  • Organizations should monitor and control VPN installations closely.

Ethan Moreno
Last updated: 7 November, 2024 - 1:08 pm 1:08 pm
Ethan Moreno 1 year ago
Share
SHARE

China’s state-sponsored cyber groups are increasingly targeting European networks, leveraging legitimate tools to obscure their activities. This expansion marks a significant shift in their cyber espionage strategies, aiming to infiltrate sensitive sectors across different regions.

Contents
How Are Chinese Hackers Expanding Their Target Range?What Techniques Are Being Employed to Evade Detection?What Implications Does This Have for European Cybersecurity?

ESET’s recent findings reveal that groups like MirrorFace and CloudSourcerer have extended their operations beyond Asia, now focusing on European Union entities. This indicates a strategic move to diversify their intelligence-gathering efforts globally.

Previously, similar Chinese cyber activities were primarily concentrated around neighboring countries, but the shift towards the EU signifies a broader agenda. The use of recognized software tools like SoftEther VPN demonstrates their adaptability in evading detection.

How Are Chinese Hackers Expanding Their Target Range?

The groups are now directing their attacks towards organizations within the European Union, including diplomatic and defense sectors, as part of a deliberate effort to enhance Beijing’s intelligence capabilities.

What Techniques Are Being Employed to Evade Detection?

Instead of traditional backdoors, these hackers utilize SoftEther VPN, a legitimate open-source program, to maintain stealthy connections and blend their traffic with regular network activity.

What Implications Does This Have for European Cybersecurity?

European organizations must heighten their cybersecurity defenses, particularly by monitoring unexpected VPN installations and ensuring that legitimate software is not misused by unauthorized entities.

In light of these developments, it is crucial for European institutions to reassess their cybersecurity protocols. Implementing strict controls over software installations and enhancing network monitoring can mitigate the risks posed by such sophisticated cyber threats.

ESET advises that any unauthorized deployment of SoftEther VPN should be treated with suspicion, especially if the executable does not match expected filenames or lacks a legitimate purpose within the network.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

University of Pennsylvania Faces Data Breach After Oracle EBS Attack

Google Fixes 107 Android Flaws, Tackles Critical Zero-Day Threats

Authorities Seize Cryptomixer’s Assets in Multinational Money Laundering Crackdown

Ransomware Attack Forces Shutdown of OnSolve CodeRED System

Lawmakers Seek Anthropic CEO’s Input on AI-Aided Cyber Espionage

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Wordle Reveals November 7 Answer: EVENT
Next Article Apple’s M4 Ultra Chip May Surpass RTX 4090 in Graphics

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

OED Picks “Rage Bait” as 2023 Word of the Year
Gaming
Samsung Offers Galaxy Watch 8 Classic Trade-In Deal
Wearables
Tesla Hosts FSD Ride-Alongs During Holiday Events in the Netherlands
Electric Vehicle
Tesla Drives Strong November Sales Surge in China
Electric Vehicle
Humanoid Engineers Achieve Fast Prototyping with Alpha Bipedal Robot
Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?