Exclusive: Hacker group with members from Europe, North America found to have ...

Exclusive: Hacker group with members from Europe, North America found to have ...

Cyber attack Photo:VCG


Chinese cybersecurity experts have exposed a hacker group, with its core members coming from Europe and North America, which has been launching sustained cyberattacks against China as its primary target, posing a serious threat to the country’s cybersecurity and data security, the Global Times learned from a Beijing-based cybersecurity lab on Sunday.

In a report the Global Times obtained from Qi An Pangu lab, it revealed the hacking group, named Against The West (ATW), has claimed to have disclosed sensitive information including source code and database of important information systems related to China about more than 70 times since 2021, involving some 300 information systems of more than 100 important government agencies as well as aviation and infrastructure departments. 

In particular, since 2022, ATW has intensified its momentum and continued to carry out large-scale scanning detection and “supply chain” attacks on Chinese networks, the report shows. 

Through long-term tracking, cybersecurity experts from Qi An Pangu lab found that the active members of ATW are mainly engaged in programming and network engineer-related occupations and they are mainly located in Switzerland, France, Poland, Canada and other countries. 

This is the second time that the lab revealed the true face of a hacker organization that has been carrying out data theft and network attacks on China, following the exposure of the complete technical details of Equation, an elite hacking group affiliated with the NSA, in February 2022. Equation was found to have been creating an advanced and covert backdoor, which has been used to monitor 45 countries and regions for over a decade. 

According to the report, the ATW group was established in June 2021 and became active in online forums in October th ..

Support the originator by clicking the read the rest link below.