'Chinese government-linked' hackers recently attempted to break into presumptive Democratic presidential candidate Joe Biden's campaign staff email accounts, while 'Iranian government-linked' hackers attempted to do the same against Trump campaign staff, Google Threat Analysis Group chief Shane Huntley has announced.
The attacks are said to have used phishing tactics, with "no sign of compromise" to report. according to Huntley.
Recently TAG saw China APT group targeting Biden campaign staff & Iran APT targeting Trump campaign staff with phishing. No sign of compromise. We sent users our govt attack warning and we referred to fed law enforcement. According to this tweet,https://t.co/ozlRL4SwhG
The cybersecurity king urged staffers from both campaign to "use the best protection you can," recommending "two factor authentication or Advanced Protection," which he suggested "really can make a difference."
Huntley indicated that the groups' alleged links to the Chinese and Iranian governments were confirmed by their callsigns, 'APT31' , which Malpedia identifies as a 'Chinese government'-connected phishing operation said to ordinarily specialize in intellectual property, and 'APT35' , a "threat group sponsored by the Iranian government" which works to "conduct long term, resource-intensive operations to collect strategic intelligence."
Chinese and Iranian authorities have yet to comment on Google's claims.
The allegations are reminiscent of the long-since debunked 'Russia hacking' claims pushed by Hillary Clinton in the run-up and aftermath of the 2016 presidential race. President Trump and the Republicans have since attributed the hacking conspiracy to a Ukraine-linked cybersecurity company, with Trump's request for a probe into the issue by Kiev becoming the focal point of the recent impeachment inquiry and trial in Congress. To date, the true identity of the Democratic Party server has yet to be established.
Last year, Finnish cybersecurity analyst Petri Krohn said that "cyber attribution or using forensic methods to establish the origin of cyberattacks and operations is extremely difficult" owing to the ease with with intelligence services can "hide their tracks and make it seem like the attack is the work of their opponent."
No comments:
Post a Comment