Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-plugin-hostgator domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the ol-scrapes domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":1091,"date":"2022-03-08T16:25:33","date_gmt":"2022-03-08T16:25:33","guid":{"rendered":"https:\/\/scienceandnerds.com\/2022\/03\/08\/china-backed-hackers-breached-government-networks-in-at-least-six-us-states-per-new-report\/"},"modified":"2022-03-08T16:25:35","modified_gmt":"2022-03-08T16:25:35","slug":"china-backed-hackers-breached-government-networks-in-at-least-six-us-states-per-new-report","status":"publish","type":"post","link":"https:\/\/scienceandnerds.com\/2022\/03\/08\/china-backed-hackers-breached-government-networks-in-at-least-six-us-states-per-new-report\/","title":{"rendered":"China-backed hackers breached government networks in at least six US states, per new report"},"content":{"rendered":"

Source: https:\/\/www.theverge.com\/2022\/3\/8\/22966517\/china-hack-government-networks-apt41-usaherd<\/a>
\n
<\/br><\/code><\/p>\n

\n

A technically advanced hacking group backed by the Chinese government has compromised the computer systems of at least six US state governments, according to a newly published threat report<\/a> from cybersecurity firm Mandiant.<\/p>\n

The group, which Mandiant refers to as APT41, targeted state governments in the US between May 2021 and February 2022, according to the report. Where networks were breached, Mandiant found evidence of the exfiltration of personally identifying information \u201cconsistent with an espionage operation,\u201d although the company said that it could not make a definitive assessment of intent at this time.<\/p>\n

All in all, Mandiant\u2019s research paints a picture of a formidable, constantly adapting adversary.<\/p>\n

\u201cAPT41\u2019s recent activity against U.S. state governments consists of significant new capabilities, from new attack vectors to post-compromise tools and techniques,\u201d the report reads. \u201cAPT41 can quickly adapt their initial access techniques by re-compromising an environment through a different vector, or by rapidly operationalizing a fresh vulnerability. The group also demonstrates a willingness to retool and deploy capabilities through new attack vectors as opposed to holding onto them for future use.\u201d<\/p>\n

\n