Pulse Secure VPN hacking also hit transportation, telecom firms, FireEye says

A sprawling Chinese espionage operation against U.S. and European government organizations extends to additional commercial sectors than previously known and involves four new hacking tools, security firm FireEye said Thursday.

All told, two China-linked groups — and other hackers that investigators did not name — are exploiting virtual private network software in breaches that have touched the transportation and telecommunication sectors, according to FireEye. The firm had previously only named the defense, financial  and government sectors as affected by the breaches.

The attackers are exploiting popular VPN software known as Pulse Connect Secure to burrow into networks and steal sensitive data. Many of the breached organizations “operate in verticals and industries aligned with Beijing’s strategic objectives” that are outlined in the Chinese government’s latest “Five Year Plan” for economic growth, according to Mandiant, FireEye’s incident response arm.

The majority of the intrusions have been carried out by a group called UNC2630, which appears to operate on behalf of the Chinese government, said Sarah Jones, senior principal analyst at Mandiant Threat Intelligence. The alleged Chinese hackers are using four additional pieces of malware to steal data and cover their tracks.

“Chinese cyber-espionage activity has demonstrated a higher tolerance for risk and is less constrained by diplomatic pressures than previously characterized,” analysts from Mandiant wrote in a blog Thursday.

In separate activity that Microsoft revealed in March, alleged Chinese spies exploited flaws in the Exchange Server software to steal email inboxes from U.S. organizations. Some analysts argued that those hacks violated cyberspace norms because the malicious code left on victim computers could have been exploited by a range of financially motivated criminals.

A spokesperson for the Chinese Embassy in Washington, D.C., did not immediately respond to a request for comment on Thursday on Mandiant’s findings. Beijing routinely denies conducting cyberattacks.

Responding to the alleged Chinese hacks — along with an alleged Russian operation exploitation SolarWinds software — has often been a labor-intensive cleanup for U.S. officials. At least 24 federal agencies use Pulse Connect Secure, with some national-security-focused research labs openly advertising their use of the software. At least five agencies have been breached.

The Department of Homeland Security’s cybersecurity agency has issued emergency directives to federal agencies to apply the Pulse Connect Secure and Exchange Server software updates.

In some of the Pulse Connect breaches, the alleged Chinese spies covered up evidence of many of their compromises as Mandiant prepared to expose the operation last month, the security firm said.

Mandiant analysts argue that Chinese hackers have in recent years gotten more efficient and strategic in targeting data held by organizations that might help Beijing advance its political, military and economic goals.

“The greater ambition and risk tolerance demonstrated by Chinese policymakers since 2019 indicates that the tempo of Chinese state-sponsored activity may increase in the near future and that the Chinese cyber threat apparatus presents a renewed and serious threat to U.S. and European commercial entities,” the analysts warned.

The post Pulse Secure VPN hacking also hit transportation, telecom firms, FireEye says appeared first on CyberScoop.


This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.