Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Chinese Hackers Intensify Ransomware Campaigns: Researchers Report
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Chinese Hackers Intensify Ransomware Campaigns: Researchers Report

Highlights

  • Chinese-linked cyberespionage groups increasingly use ransomware.

  • This tactic complicates attribution and serves strategic purposes.

  • Recent analysis shows overlaps with Chinese and North Korean activities.

Kaan Demirel
Last updated: 26 June, 2024 - 1:16 pm 1:16 pm
Kaan Demirel 11 months ago
Share
SHARE

Cybersecurity researchers have discovered a significant shift in tactics by Chinese-linked cyberespionage groups. They now increasingly employ ransomware as an endgame in their operations. This new strategy not only focuses on financial gain but also complicates the attribution of cyberattacks and adds layers of strategic ambiguity. According to SentinelLabs and Recorded Future, such techniques have been recently observed in incidents targeting high-profile institutions, including the Brazilian presidency and the All India Institute of Medical Sciences (AIIMS).

Contents
Ransomware as a Cover for EspionageStrategic Implications and MisattributionDestructive Potential of Ransomware

Ransomware as a Cover for Espionage

State-sponsored hackers have traditionally avoided ransomware, but the trend is changing. The recent report points out that ChamelGang, a suspected Chinese-linked group, was behind ransomware attacks previously thought to be financially motivated. This strategy enables these groups to mask espionage activities, presenting them instead as ordinary cybercrime incidents.

Strategic Implications and Misattribution

Misidentifying cyberespionage as simple ransomware attacks can have severe strategic consequences. Government and critical infrastructure targets are particularly vulnerable. The perceived financial motivation diverts attention from the real aim, which is often data or intelligence theft. This diversion aids attackers by complicating the task of linking the attacks to state-sponsored actors.

Destructive Potential of Ransomware

Ransomware locks files and demands a ransom for their release, but sometimes attackers don’t decrypt the data, leading to destructive outcomes. This tactic plays into the hands of cyberespionage groups, who can destroy evidence of their intrusion. The focus on restoring systems and data often leaves the real perpetrators unexposed.

The AIIMS attack in November 2022 was described as “cyber terrorism” by Delhi police, suspected to be the work of Chinese hackers. Government officials hinted at the possibility of a “hostile cross-border attack,” although attribution remains a complex issue. China’s representative in Washington, D.C., reiterated China’s opposition to all forms of cyberattacks, highlighting the difficulties in pinpointing attack sources due to the anonymous nature of cyberspace.

U.S. officials continue to warn about China’s aggressive cyber capabilities, with incidents like Volt Typhoon aiming to influence U.S. policy decisions. While the use of ransomware in state-aligned operations isn’t new, the current trend underscores its evolving role as a smokescreen for more nefarious activities.

Researchers have previously linked Chinese groups like APT41 to dual-purpose operations involving espionage and financially motivated cybercrime. Similar activities were documented by Secureworks and Microsoft, highlighting the complexity of these operations. Additionally, Russian military intelligence has utilized ransomware during its conflict with Ukraine, further demonstrating the multifaceted use of such tools.

Ben Carr from Halcyon emphasizes that ransomware serves multiple goals, including intelligence gathering and strategic deception. The evolving landscape of cyberespionage reflects increasingly sophisticated tactics designed to confuse and mislead investigators.

Recent analysis also identified another cluster of cyberespionage using off-the-shelf tools targeting manufacturers and various sectors in the Americas and Europe. While the perpetrators of these attacks remain unclear, there are overlaps with activities linked to Chinese and North Korean actors.

The use of ransomware by state-linked cyber groups is a growing concern. It illustrates the blending of traditional cyberespionage with financially motivated cybercrime, complicating attribution and response efforts. By deploying ransomware, these groups achieve multiple objectives – financial gain, strategic misdirection, and the destruction of incriminating evidence.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Apple Unveils iPhone 15 Pro Max with Advanced Features
Next Article Highly‐Aligned All‐Fiber Actuator with Asymmetric Photothermal‐Humidity Response and Autonomous Perceptivity

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

G1T4-M1N1 Droid Launch Captivates Star Wars and Tech Fans Alike
Robotics
Elon Musk Shares Tesla Optimus Dance Video
Electric Vehicle
North American Robot Orders Stabilize in Early 2025
Robotics
UR15 Boosts Automation Speed in Key Industries
Robotics
NHTSA Questions Tesla’s Robotaxi Plans in Austin
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?