TechCrunch News 01月15日
DOJ confirms FBI operation that mass-deleted Chinese malware from thousands of US computers
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

美国司法部和联邦调查局宣布,他们与法国合作,成功清除了一个名为“Twill Typhoon”或“Mustang Panda”的中国政府支持的黑客组织在全球数百万台计算机上植入的恶意软件。该恶意软件名为“PlugX”,自2012年起被观察到,并通过USB端口传播,用于窃取数据进行间谍活动。美国在2024年8月的一次法院授权行动中,清除了美国境内4200多台受感染计算机上的恶意软件。法国当局也发现该恶意软件在全球范围内感染了数百万台计算机,包括在法国的3000台设备。该黑客组织的目标包括政府和私人组织,遍布欧洲、非洲、印太地区等。

💻 美国司法部和联邦调查局联合法国,清除了中国支持的黑客组织“Twill Typhoon”在全球数百万台计算机上植入的恶意软件“PlugX”。

💽 “PlugX”恶意软件通过USB端口传播,自2012年起被观察到,用于窃取数据并进行间谍活动,目标包括政府、私人组织以及异见团体。

🛡️ 美国在2024年8月通过法院授权行动,清除了美国境内4200多台受感染计算机上的恶意软件,而法国也发现该恶意软件在全球感染数百万台电脑,包括法国的3000台设备。

🌍 “Twill Typhoon”的目标包括欧洲的航运公司、多个欧洲政府、中国异见团体以及印太地区的多个政府。该组织是多个以“Typhoon”命名的中国政府支持黑客组织之一。

U.S. authorities have confirmed that they disrupted the operations of a Chinese state-backing hacking group, which infiltrated millions of computers worldwide to steal data as part of a years-long espionage campaign. 

The Department of Justice and the FBI said on Tuesday that they had successfully deleted the malware planted by the China-backed hacking group, known as “Twill Typhoon” or “Mustang Panda,” from thousands of infected systems across the United States during a court-authorized operation in August 2024. 

French authorities led the operation with assistance from Paris-based cybersecurity company Sekoai. In a press release last year, French prosecutors said the malware — known as “PlugX” — had infected several million computers globally, including 3,000 devices located in France. 

Sekoia said in a blog post that it developed the capability to send commands to infected devices in order to delete the PlugX malware. U.S. authorities said that the operation was used to delete the malware from more than 4,200 infected computers in the United States. 

In court records filed in the federal court in Pennsylvania, the FBI said it had observed the malware — typically installed on a target’s device through a computer’s USB port — since as early as 2012, and that the malware had been used by Chinese state-backed hackers since 2014. 

Once installed, the malware goes on to “collect and stage the victim’s computer files for exfiltration,” the FBI said. French authorities say the PlugX malware is “used in particular for espionage purposes.” 

In its statement Tuesday, the U.S. Justice Department accused the Chinese government of paying the Twill Typhoon group to develop the PlugX malware. China has long denied U.S. allegations of hacking.

While specific victims of this hacking campaign have not been named, the FBI says that Twill Typhoon infiltrated the systems of “numerous’ government and private organizations, including in the United States. Significant targets include European shipping companies, several European governments, Chinese dissident groups, and various governments throughout the Indo-Pacific region, according to the FBI.

Twill Typhoon joins the growing list of Typhoon-monikered Chinese state-sponsored hacking groups. This list includes Volt Typhoon, a group of Chinese government hackers tasked with setting the stage for destructive cyberattacks, and Salt Typhoon, the China-backed group responsible for the mass hacking of U.S. phone and internet companies.

According to Microsoft, which developed the naming system for hacking groups, Twill Typhoon (previously known as “Tanalum”) has a history of successfully compromising government machines across Africa and Europe, and humanitarian organizations worldwide. 

Microsoft did not immediately respond to TechCrunch’s questions on Tuesday.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

网络安全 黑客组织 间谍活动 PlugX Twill Typhoon
相关文章