Skip to content

State Advisory Warns of Cyber Threat by Chinese Government-Linked Groups

Danger to Australian digital networks from a Chinese state-backed hacking group, APT40, highlighted by the Australian Cyber Security Centre (ACSC) in the advisory titled "PRC MSS Tactics in Action," released jointly with relevant law enforcement and cybersecurity agencies on July 9, 2024.

Chinese State-Supported Cyberattacks Warned About by ACSC
Chinese State-Supported Cyberattacks Warned About by ACSC

State Advisory Warns of Cyber Threat by Chinese Government-Linked Groups

The Australian Cyber Security Centre (ACSC) has issued a timely advisory, titled "APT40, PRC MSS Tradecraft in Action," on July 9, 2024, to alert Australian networks about the potential threat posed by a state-sponsored cyber group based in the People's Republic of China (PRC).

APT40, also known by various names such as APT 40, Kryptonite Panda, GINGHAM TYPHOON, Leviathan, and Bronze Mohawk, is a group assessed to conduct malicious cyber operations for the PRC Ministry of State Security (MSS). This cyber group has been rapidly exploiting newly public vulnerabilities in widely used software, such as Log4J, Atlassian Confluence, and Microsoft Exchange.

The ACSC and other agencies expect APT40 to continue using Proofs of Concept (POCs) for new high-profile vulnerabilities within hours or days of their public release. Many of the compromised Small Office/Home Office (SOHO) devices, which are often end-of-life or unpatched, provide a soft target for N-day exploitation.

APT40 has been observed to use these compromised SOHO devices, particularly routers, to launch cyberespionage operations in Australia. However, the exact device models or affected companies in Australia are not detailed in the available information.

Once compromised, these SOHO devices offer a launching point for attacks that blend in with legitimate traffic, challenging network defenders. APT40 has evolved its tradecraft, using compromised SOHO devices as operational infrastructure and last-hop redirectors for its operations in Australia.

The advisory was issued in conjunction with law enforcement and cybersecurity agencies in the US, the UK, Canada, Germany, New Zealand, South Korea, and Japan, highlighting the global nature of this shared threat.

To mitigate cybersecurity incidents, the Australian Signals Directorate's ACSC recommends implementing the ASD Essential Eight Controls and associated strategies. As the threat posed by APT40 to Australian and government and private sector networks remains ongoing, it is crucial for organisations to stay vigilant and follow these recommendations.

In addition, APT40 regularly conducts reconnaissance against networks of interest, including networks in the agencies' countries, looking for opportunities to compromise its targets. Early detection and response are key to minimising the impact of such cyber threats.

In conclusion, the ACSC's advisory serves as a reminder for Australian organisations to strengthen their cybersecurity measures and remain vigilant against the ongoing threat posed by state-sponsored groups like APT40.

Read also:

Latest