FireEye, a California-based network security firm, has reasons to believe that the Chinese government is behind an on-going cyber espionage in India and other Southeast Asian countries including the Philippines that dates as far back as 2004. In the company’s recently-published report, FireEye Labs Team in Singapore uncovered a set of malware that were developed with a dedicated set of tools built by a group identified in the report as APT 30 which stands for Advanced Persistent Threat. FireEye was keen to point out that the tool that APT30 is using is constantly updated which allow them to be virtually undetected for at least a decade. Based on the targets that FireEye identified, which are mostly in the Southeast Asian region, the security firm suspects that the malware is primarily being used by APT 30 in “acquiring sensitive information from a variety of targets” for political gain. Along with political targets, FireEye also uncovered that APT 30 is also spying on private companies and journalists across Southeast Asia, particular those “who do not provide favorable coverage”. In an interview with TechCrunch, FireEYE CTO for APAC Bryce Boland stated that although their research doesn’t provide an exact proof that will link the Chinese government to the decade-long cyber espionage, “all signs point to China”. Read more in our articles including "China Linked to Decade-long Spying in SEA Countries" and "The biggest changes are coming to Android Auto".
FireEye, a California-based network security firm, has reasons to believe that the Chinese government is behind an on-going cyber espionage in India and other Southeast Asian countries including the Philippines that dates as far back as 2004. In the company’s recently-published report, FireEye Labs Team in Singapore uncovered a set of malware that were developed with a dedicated set of tools built by a group identified in the report as APT 30 which stands for Advanced Persistent Threat.
FireEye was keen to point out that the tool that APT30 is using is constantly updated which allow them to be virtually undetected for at least a decade. Based on the targets that FireEye identified, which are mostly in the Southeast Asian region, the security firm suspects that the malware is primarily being used by APT 30 in “acquiring sensitive information from a variety of targets” for political gain. Along with political targets, FireEye also uncovered that APT 30 is also spying on private companies and journalists across Southeast Asia, particular those “who do not provide favorable coverage”.
Our coverage of fireeye includes: "China Linked to Decade-long Spying in SEA Countries"; "The biggest changes are coming to Android Auto"; "Free internet 24/7 now at Pasig River stations and ferries". Each article provides unique insights and information.