Chinese hackers go after third-party IT suppliers to steal data
Security

Chinese hackers go after third-party IT suppliers to steal data

Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers. 

Major IT suppliers that specialize in cloud storage, help desk, and application management have become a top target for the hacking group known as APT10, security providers BAE Systems and PwC said in a joint report.

That's because these suppliers often have direct access to their client's networks. APT10 has been found stealing intellectual property as part of a global cyberespionage campaign that ramped up last year, PwC said on Monday.

The joint report doesn't identify which IT service providers were hit or how many were found breached. But the providers included several suppliers in enterprise services and cloud hosting.

"It is impossible to say how many organizations might be impacted altogether at this point," BAE Systems said in a blog post.

APT10 has been around since at least 2009 and is believed to be based in China, according to security researchers. To kick off their attacks, the hackers have used spear-phishing email schemes to trick their victims into installing malware, either through an attachment or through a link that leads to a malicious site.

screen shot 2017 04 04 at 12.43.08 pm PwC

Countries targeted by APT10.

From there, APT10 will try to steal the credentials from the IT service provider to hop over to their clients' private networks. The hackers will then move on to intellectual property theft, by using the IT service provider's own infrastructure to secretly exfiltrate the data.    

APT10's hacking campaign has continued into this year. The group has targeted a whole range of industries across the globe including retail, energy, technology, and the public sector.

The UK's National Cyber Security Centre has warned the public about the hacking campaign.

“This incident should remind organizations that entire supply chains need to be managed, and they cannot outsource their risk,” it said in a statement.

Businesses should talk with IT service providers about how they protect access to their data and demand any changes needed, the UK center recommended.  

IDG Insider

PREVIOUS ARTICLE

«After Congress revokes Internet privacy rules, downloads double of VPN-equipped Opera browser

NEXT ARTICLE

Good-bye Internet pioneers. Hello, Oath?»

Add Your Comment

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should we donate our health data the same way we donate organs?