back to article China-based hacking crew pokes holes in UK firms and drains data

UK companies are being targeted by a China-based global hacking group dubbed APT10. The Operation Cloud Hopper campaign focuses on managed service providers (MSPs) which, when successful, gives the APT10 hackers access to their intellectual property, sensitive data, and global clients. A number of Japanese organisations have …

  1. The_Idiot

    So tell me again...

    ... Ms Rudd, about how weakened encryption with 'secret' (at least, according to some government definition of 'secret') backdoors is a really, really good idea.

    1. Anonymous Coward
      Anonymous Coward

      Re: So tell me again...

      The back doors are not for corporations and business.

      Think about it, has any government really ever done anything against big business who fund their campaigns?

      No, the back doors are for the people and their data/information.

  2. Anonymous Coward
    Terminator

    Open-source Chinese Cyber-spies

    The solution is obvious, we must ban 'open-source' and only use the industry standard Microsoft product.

    "PwC UK and BAE Systems rate it "highly likely" that APT10 is a China-based threat actor."

    Because China is one of Uncle Sams current bogeymen ..

    1. Anonymous Coward
      Anonymous Coward

      Re: Open-source Chinese Cyber-spies

      BAE Systems went on to say that there is no evidence of UK or US based groups hacking Chinese or Russian companies or anyone else they don't like.

      Because it's not cricket.

      Just trust us.

  3. Anonymous Coward
    Anonymous Coward

    Useless

    I dont doubt the attribution here - a surprising amount of effort goes into this and it is quite different from what Wikileaks wants to allude.

    However, this is pretty useless.

    If I sum up the press release cum talking heads article, it basically says "foreign, possibly nation state but at least well resourced, attackers are trying to get data and sometimes succeed."

    Where are the IoCs? Where is the actionable value? What can anyone do with this information?

    1. Alba

      Re: Useless

      The IoCs were published last week on CISP. Full report with data in it is here https://www.pwc.co.uk/issues/cyber-security-data-privacy/insights/operation-cloud-hopper.html. NCSC guidance is here https://www.ncsc.gov.uk/information/global-targeting-enterprises-managed-service-providers

    2. Tom Paine

      Re: Useless

      The IOCs are in the Kaspersky report, if you click through:

      https://securelist.com/files/2017/04/Lazarus_Under_The_Hood_PDF_final.pdf

  4. This post has been deleted by its author

  5. John Smith 19 Gold badge
    Unhappy

    Well who'd have thought it.

    People can't get in through the front door so they hit the Tradesmen's Entrance.

    And why hit one company when you can hit the company that supports multiple targets.

    Wasn't one of the touted benefits of using an MSP that it can justify decent security, proper patch management, comprehensive backups?

  6. Sanctimonious Prick
    Black Helicopters

    APT10 = CIA

    I'm sure this was all revealed just the other day...

    https://www.theregister.co.uk/2017/03/31/wikileaks_cia/

  7. Anonymous Coward
    Anonymous Coward

    mmm BAE Systems

    BAE Systems: "There are over 550 million firearms in worldwide circulation. That's one firearm for every twelve people on the planet. The only question is: How do we arm the other 11?"

    Or was it Yuri Orlov?

    Does it make any difference?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2021