Hackers broke into the internal networks on major companies, such as HPE and IBM, and stole corporate data and trade secrets. Then the attackers used the stolen information to target into customer systems.
The list of victims is long and includes tech giants like HPE, IBM, DXC, Fujitsu, and Tata.
“Teams of hackers connected to the Chinese Ministry of State Security had penetrated HPE’s cloud computing service and used it as a launchpad to attack customers, plundering reams of corporate and government secrets for years in what U.S. prosecutors say was an effort to boost Chinese economic interests.” reads a report published by the Reuters agency.
“The hacking campaign, known as “Cloud Hopper,” was the subject of a U.S. indictment in December that accused two Chinese nationals of identity theft and fraud. Prosecutors described an elaborate operation that victimized multiple Western companies but stopped short of naming them. A Reuters report at the time identified two: Hewlett Packard Enterprise and IBM.”
The report attributed the
An initial report revealed that Cloud Hopper hackers compromised the internal networks at HPE and IBM, then targeted customer servers that were managed by the IT giants, or connected in some way to their infrastructure.
Now, the Reuters revealed that at least another six companies were hacked as part of the same campaign conducted by the APT10 threat actors. The breached companies are Fujitsu, Tata Consultancy Services, Dimension Data, NTT, and Computer Sciences Corporation.
Even is HPE has been hacked multiple times since 2010, most of the hack occurred between 2015 and 2017.
APT10 hackers also targeted the customers of the IT companies stealing plans, blueprints, personal information, and other data.
“APT10 often attacked a service provider’s system by “spear-phishing” – sending company
“After the attackers “hopped” from a service provider’s network into a client system, their behavior varied, which suggests the attacks were conducted by multiple teams with different skill levels and tasks, say those aware of the operation. Some intruders resembled “drunken burglars,” said one source, getting lost in the labyrinth of corporate systems and appearing to grab files at random.”
According to the Reuters, the hackers had a total control over the HPE corporate network, they also left messages taunting system administrators.
One of the hacking tool used by the group in the campaign contained the message ‘FUCK ANY AV’ referencing the fact that victims’ protected their infrastructure with antivirus software. In one case, threat actors used the name nsa.mefound.com to mock US intelligence.
The situation is disconcerting and unique certainly is that Cloud Hopper campaign is still ongoing and hackers are adopting new techniques to remain under the radar for a long.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.