TechCrunch News 01月09日
Japan says Chinese hackers targeted its government and tech companies for years
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

日本政府周三发布警报,指控中国黑客组织MirrorFace自2019年以来,长期攻击日本政府机构、公司和个人。日本警方和网络安全机构认为,MirrorFace的攻击目标主要是窃取日本国家安全和先进技术相关信息。攻击对象包括日本外务省、防卫省、宇宙机构、政客、记者、私营公司和智库。该组织最初攻击媒体、政治组织、智库和大学,2023年后转向制造商和研究机构。MirrorFace通过鱼叉式网络钓鱼邮件传播恶意附件,针对不同目标实施了多轮攻击。

🎯MirrorFace组织自2019年起对日本展开网络攻击,主要目标是窃取日本国家安全和先进技术信息。

📧该组织利用鱼叉式网络钓鱼邮件传播恶意附件,针对智库、现任及退休政客、记者等个人,以及半导体、制造、信息通信、学术和航空航天领域的企业网络设备进行攻击。

📅攻击活动可分为三个阶段:2019至2023年针对个人,2023年后转向企业网络设备,以及2024年6月开始的新一轮针对学术界、智库、政客和媒体的攻击。

🛡️日本的和平宪法可能导致其在网络空间防御能力有限,这使得日本更容易成为网络攻击的目标。

The Japanese government published an alert on Wednesday accusing a Chinese hacking group of targeting and breaching dozens of government organizations, companies, and individuals in the country since 2019. 

Japan’s National Police Agency and the National Center of Incident Readiness and Strategy for Cybersecurity attributed the years-long hacking spree to a group called MirrorFace

“The MirrorFace attack campaign is an organized cyber attack suspected to be linked to China, with the primary objective of stealing information related to Japan’s national security and advanced technology,” the authorities wrote in the alert, according to a machine translation. 

A longer version of the alert said the targets included Japan’s Foreign and Defense ministries, the country’s space agency, as well as politicians, journalists, private companies and tech think tanks, according to the Associated Press

In July 2024 Japan’s Computer Emergency Response Team Coordination Center (JPCERT/CC) wrote in a blog post that MirrorFace’s “targets were initially media, political organisations, think tanks and universities, but it has shifted to manufacturers and research institutions since 2023.”

In 2022, cybersecurity firm ESET published research detailing a spearfishing email campaign carried out by MirrorFace that targeted Japanese political entities and specific politicians ahead of elections in the country. At the time, the company said MirrorFace does not appear to be linked to other known Chinese government hacking groups. 

Spearphishing is the same technique used by MirrorFace in the years-long campaign revealed on Wednesday. The alert said MirrorFace sent emails containing malicious attachments in three separate campaigns: one from 2019 to 2023 targeting individuals working for think tanks, active and retired politicians, and journalists; another campaign operating since 2023 targeting internet-connected network devices used in companies in the “semiconductor, manufacturing, information and communications, academic, and aerospace sectors;” and a third starting around June 2024 that targeted “academics, think tanks, politicians, and the media” in Japan; according to a machine translation of the document. 

Japan, a long-time ally of the United States, has a pacifist constitution, which experts argue has contributed to its limited capabilities in cyberspace. In 2023, The Washington Post reported that the U.S. National Security Agency discovered in 2020 that Chinese military hackers had compromised some of the most sensitive classified defense networks in Japan.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

MirrorFace 网络攻击 日本 中国 网络安全
相关文章