Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Chinese Hackers Broaden Targets to European Organizations
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Chinese Hackers Broaden Targets to European Organizations

Highlights

  • Chinese hackers are targeting EU organizations using legitimate VPN tools.

  • ESET reports enhanced stealth tactics by groups like MirrorFace.

  • Organizations should monitor and control VPN installations closely.

Ethan Moreno
Last updated: 7 November, 2024 - 1:08 pm 1:08 pm
Ethan Moreno 6 months ago
Share
SHARE

China’s state-sponsored cyber groups are increasingly targeting European networks, leveraging legitimate tools to obscure their activities. This expansion marks a significant shift in their cyber espionage strategies, aiming to infiltrate sensitive sectors across different regions.

Contents
How Are Chinese Hackers Expanding Their Target Range?What Techniques Are Being Employed to Evade Detection?What Implications Does This Have for European Cybersecurity?

ESET’s recent findings reveal that groups like MirrorFace and CloudSourcerer have extended their operations beyond Asia, now focusing on European Union entities. This indicates a strategic move to diversify their intelligence-gathering efforts globally.

Previously, similar Chinese cyber activities were primarily concentrated around neighboring countries, but the shift towards the EU signifies a broader agenda. The use of recognized software tools like SoftEther VPN demonstrates their adaptability in evading detection.

How Are Chinese Hackers Expanding Their Target Range?

The groups are now directing their attacks towards organizations within the European Union, including diplomatic and defense sectors, as part of a deliberate effort to enhance Beijing’s intelligence capabilities.

What Techniques Are Being Employed to Evade Detection?

Instead of traditional backdoors, these hackers utilize SoftEther VPN, a legitimate open-source program, to maintain stealthy connections and blend their traffic with regular network activity.

What Implications Does This Have for European Cybersecurity?

European organizations must heighten their cybersecurity defenses, particularly by monitoring unexpected VPN installations and ensuring that legitimate software is not misused by unauthorized entities.

In light of these developments, it is crucial for European institutions to reassess their cybersecurity protocols. Implementing strict controls over software installations and enhancing network monitoring can mitigate the risks posed by such sophisticated cyber threats.

ESET advises that any unauthorized deployment of SoftEther VPN should be treated with suspicion, especially if the executable does not match expected filenames or lacks a legitimate purpose within the network.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Trump Urges Colorado to Release Jailed Clerk Over Election Breach

Google Targets Vulnerabilities in May Security Update

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Wordle Reveals November 7 Answer: EVENT
Next Article Apple’s M4 Ultra Chip May Surpass RTX 4090 in Graphics

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Sonair Unveils ADAR Sensor to Enhance Robot Safety
Robotics
Apple Plans to Add Camera to Future Apple Watch Models
Wearables
Mazda Partners with Tesla for Charging Standard Shift
Electric Vehicle
Trump Alters AI Chip Export Strategy, Reversing Biden Controls
AI
Solve Wordle’s Daily Puzzle with These Expert Tips
Gaming
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?