Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025

US House forbids WhatsApp on official security and protection devices

June 24, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Salt Typhoon associated with China
Global Security

Salt Typhoon associated with China

AdminBy AdminJune 24, 2025No Comments3 Mins Read
China-linked Salt Typhoon
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 24, 2025Red LakshmananCyber ​​-Shpian / Chinese Hackers

Salt Typhoon associated with China

The Canadian Cybersecurity and the Federal Bureau of the US (FBI) is removed Advisory Warning on Cyberats established in China related The salt typhoon Actors of violation of large global telecommunications providers as part of the Cyber ​​-Spanning campaign.

Attackers used critical Cisco iOS XE (Cve-2013-20198.

It is said that the threat subjects have changed at least one of the files to configure the overall encapsulation of the routing (Great) Tunnel by including traffic from the network. The name of the target company was not disclosed.

Cybersecurity

Starting that targeting is likely to go beyond the telecommunications sector, the agencies said the targeting of Canadian devices could allow the subject to collect information from the impaired networks and use them as impact to violate additional devices.

“In some cases, we estimate that the activity of the actors is very likely to be limited to network exploration,” according to the warning.

In addition, the agencies have noted that Edge Network devices are still an attractive purpose for Chinese state-owned entities that seek threat that seek to violate and maintain sustainable access to telecommunications service providers.

Results results with a previous report from the recorded future that minute Operating CVE-2023-20198 and CVE-2013-20273 to penetrate telecommunications and online firms in the US, South Africa and Italy, as well as using GRE tunnels for long-term access and detachment tunnels.

UK NCSC warns about shoe rack and umbrellas on malicious programs focused on Fortinet devices

Development occurs when the National Cybersecurity Center (NCSC) has discovered two different families of malware Shoe and Umbrella stand which have been found on the 100D 100D Firewall Service, made by Fortinet.

While the shoe counter is a tool after operating for remote access to the shell and TCP tunneling through a compromised device, an umbrella stand is designed to launch Shell commands, issued from a controlled attacker.

Cybersecurity

Interestingly, the shoe stand is partly based on the publicly available instrument named Reversion_Shellby chance Purple To develop a codanamine with Windows Goreshell implant. It is currently unclear whether these activities are related.

NCSC stated that determined some similarities between the umbrella and CommunionThe back of which was previously used by Chinese hackers supported by Chinese hackers in cyberattack aimed at the Dutch network of the armed forces.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025

US House forbids WhatsApp on official security and protection devices

June 24, 2025

DHS warns pro -Irkers who can target US networks after Iran’s nuclear strikes

June 23, 2025

Echo Chamber Jailbreak Tricks LLM as Openai and Google, To create harmful content

June 23, 2025

Xdigo malicious software operates Windows LNK deficiencies at Eastern Government attacks

June 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025

US House forbids WhatsApp on official security and protection devices

June 24, 2025

Salt Typhoon associated with China

June 24, 2025

DHS warns pro -Irkers who can target US networks after Iran’s nuclear strikes

June 23, 2025

Echo Chamber Jailbreak Tricks LLM as Openai and Google, To create harmful content

June 23, 2025

Xdigo malicious software operates Windows LNK deficiencies at Eastern Government attacks

June 23, 2025

How AI AI Automation Output can help SOC reduce burnout

June 23, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025

US House forbids WhatsApp on official security and protection devices

June 24, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.