Home Business IT Security China hacked Europe before G20: reports
China hacked Europe before G20: reports australiafirstparty.net Featured

Chinese hackers attacked five European ministries before the G20 summit in September, according to new research.

Analysis by security firm FireEye and reported today by Reuters reveals that Chinese hackers sent e-mails to staff of the European ministries with files containing malware.

The hackers infiltrated the ministries' computer networks by sending emails to staff containing malicious files with titles such as "US_military_options_in_Syria," which infected the networks when recipients opened these documents.

For about a week in late August, California-based FireEye said its researchers were able to monitor the "inner workings" of the main computer server used by the hackers to conduct their reconnaissance and move across compromised systems.

FireEye, which describes itself as the 'leader in next generation threat protection', lost access to the hackers after they moved to another server shortly before the G20 Summit in St. Petersburg, Russia. The anti-virus company said it believes the hackers were preparing to start stealing data just as the researchers lost access.

The company refused to identify the nations whose ministries were hacked, although it said they were all members of the European Union. The US was seemingly left alone.

FireEye said it reported the attacks to the victims through the FBI. FBI spokeswoman Jenny Shearer declined to comment to Reuters.

FREE REPORT - IT MONITORING TOOLS COMPARISON

Are you looking to find the most efficient IT Monitoring tool available?

IT Monitoring is an essential part of the operations of any organisation with a significant network architecture.

Multiple IT monitoring platforms are available on the market today, supporting the various needs of small, medium-sized, and large enterprises, as well as managed service providers (MSPs).

This new report studies and compares eight different IT monitoring products in terms of functionality, operations, and usability on the same server platform with 100 end devices.

Which product is easiest to deploy, has the best maintenance mode capabilities, the best mobile access and custom reporting, dynamic thresholds setting, and enhanced discovery capabilities?

Download your free report to find out.

DOWNLOAD!

David Swan

David Swan is a tech journalist from Melbourne and is iTWire's Associate Editor. Having started off as a games reviewer at the age of 14, he now has a degree in Journalism from RMIT (with Honours) and owns basically every gadget under the sun.

Connect