Chinese Hackers
#77
In this edition Canada became the latest target of those evil hackers! Shocked


Quote:A Hong Kong pro-democracy activist reportedly tortured in China may have been the source through which China-backed hackers accessed personal emails of Canadian parliamentarians, a global legislative coalition director told a House of Commons committee.

Luke de Pulford, executive director of the global coalition Inter-Parliamentary Alliance on China (IPAC), made the comment on Sept. 26 in response to a question from Conservative MP Garnett Genuis during his testimony before the Standing Committee on Procedure and House Affairs.

The committee is investigating a 2021 cyberattack by the Chinese hacker group Advanced Persistent Threat Group 31 (APT31) that targeted legislative members of IPAC, including 18 Canadian parliamentarians. Genuis, who serves as the Canadian chair at IPAC, asked about how the hackers obtained his personal email and the IPAC email distribution list.

“I do not know how they obtained that, but I do have one possible theory: unfortunately, someone who used to volunteer for us, a man named Andy Li, was arrested in China under the National Security Law and imprisoned in Hong Kong. He awaits sentencing for National Security Law crimes, some of which are associated with IPAC,” de Pulford said in response.

“We know that they [Chinese authorities] breached his system, and they may have got our distribution list from him,” he added. “Very disturbingly, when he was apprehended, he was taken to Shenzhen prison in China and reportedly tortured.”

Li, a computer programmer, played a key role in a crowdfunding campaign to rally support for the 2019 pro-democracy protests in Hong Kong. He gained international attention after being one of 12 Hongkongers who attempted to flee to Taiwan by speedboat in August 2020. The group was intercepted by Chinese authorities at sea and detained at Shenzhen city.

In March, Li appeared as a prosecution witness during the trial of Hong Kong media mogul Jimmy Lai, alleging that Lai financed advertising campaigns to support the 2019 pro-democracy protests in the city. However, the United Nations Special Rapporteur on Torture, Alice Jill Edwards, expressed deep concerns about Li’s testimony, arguing that it should not be admitted as evidence since it “may have been obtained as a result of torture or other unlawful treatment.”

Cyberattack

The APT31 targeted 120 legislators from 18 countries who are members of the IPAC, de Pulford told the committee. However, they became aware of the cyberattack only recently, following the unsealing of an indictment by the U.S. Department of Justice in March, which charged seven hackers associated with the group.

According to the indictment, the hackers sent “thousands of malicious tracking email messages” with embedded hyperlinks to their targets. Once the recipients opened the emails and clicked the links, the hackers could steal their information, such as the victims’ locations, IP addresses, network details, and specific devices used to access their email accounts. These emails were sent to more than 400 unique accounts associated with IPAC members, the indictment stated.

Genuis had previously told the House of Commons that, following the 2021 cyberattack, the FBI alerted IPAC about the attempt and notified allied governments. However, he said the bureau did not directly inform non-U.S. legislators due to “rules regarding sovereignty.” Genius and other affected Canadian MPs have criticized Canadian authorities for not informing targeted parliamentarians for nearly a year after receiving U.S. intelligence about the threat.

In an April 30 statement to The Epoch Times, Mathieu Gravel, spokesperson for the House of Commons Speaker’s Office, said the administration had “determined that the risk-mitigation measures in place had successfully prevented any attack,” adding, “There were no cybersecurity impacts to any Members or their communications.” Genuis disputed this claim, noting that his personal email was targeted.

During the Sept. 26 committee meeting, de Pulford expressed concerns about parliamentarians being kept uninformed about the cyberattack, noting that it would prevent them from protecting themselves and sensitive information, such as “high-risk transnational repression cases” that many of them handle.

“Telling parliamentarians that this attack was not successful or not serious is questionable at best and misleading at worst,” he said.


Quote:Over 9,000 consumer devices in Canada have been compromised by a Beijing-backed hacker group that installed malicious software on hundreds of thousands home and office internet-connected devices worldwide, an assessment done by U.S. authorities has found.

The hacker group called “Flax Typhoon” has controlled and managed a large network of compromised devices—a botnet—that’s been active since mid-2021, says a Sept. 18 “Joint Cybersecurity Advisory“ issued by the FBI and two other U.S. national security agencies along with partner agencies in Canada, Australia, New Zealand, and the UK.

The devices, such as routers, digital video recorders, internet protocol cameras, and network-attached storage devices, are infected with a type of malware that allows the hackers to have unauthorized remote access and to carry out cyber crimes. Using the botnet as a proxy, they are able to conceal their identities during cyberattacks and other malicious activities.

“As of June 2024, the botnet consisted of over 260,000 devices. Victim devices which are part of the botnet have been observed in North America, South America, Europe, Africa, Southeast Asia and Australia,” the advisory stated.

The advisory said approximately 9,200 of those devices are based in Canada, accounting for just 3.5 percent of the total. The United States was hit hardest, with 126,000 affected devices, representing 47.9 percent of the total, far surpassing the next most impacted country, Vietnam, with 21,100 compromised devices.

The Epoch Times reached out to the Canadian Security Intelligence Service and Communications Security Establishment Canada for comment but did not hear back immediately.

The hackers of Flax Typhoon, backed by the People’s Republic of China (PRC), work for a Beijing-based publicly traded company called Integrity Technology Group that has several Chinese state-owned enterprises as key stakeholders.

The company has developed an online application that allows its customers to “log in and control specified infected victim devices,” according to court documents unsealed in the Western District of Pennsylvania, which detail the investigation of the botnet by an unnamed FBI special agent.

Botnets Disrupted

Citing the unsealed court documents, the U.S. Justice Department on Sept. 18 announced that a court-authorized law enforcement operation had disrupted the worldwide botnet.

The department said the Flax Typhoon hackers tried to interfere with the FBI-led international operation via a distributed denial-of-service attack, a cyberattack that floods a website or server with excessive traffic to make it function poorly or be knocked offline completely.

The attack targeted infrastructure the FBI was using to carry out the court’s orders but ultimately failed to stop the FBI from disrupting the botnet.

“The Justice Department is zeroing in on the Chinese government backed hacking groups that target the devices of innocent Americans and pose a serious threat to our national security,” U.S. Attorney General Merrick B. Garland said in a Sept. 18 press release.

“As we did earlier this year, the Justice Department has again destroyed a botnet used by PRC-backed hackers to infiltrate consumer devices here in the United States and around the world. We will continue to aggressively counter the threat that China’s state- sponsored hacking groups pose to the American people.”

In late January, U.S. authorities had announced an earlier court-authorized operation that disrupted another Chinese state-backed botnet run by a hacker group known as “Volt Typhoon,” which infected hundreds of U.S.-based routers in small offices and home offices.

FBI Director Christopher Wray condemned Beijing for “targeting American civilian critical infrastructure and pre-positioning to cause real-world harm to American citizens and communities in the event of conflict.”

“Volt Typhoon malware enabled China to hide as they targeted our communications, energy, transportation, and water sectors. Their pre-positioning constitutes a potential real-world threat to our physical safety that the FBI is not going to tolerate. We are going to continue to work with our partners to hit the PRC hard and early whenever we see them threaten Americans,” he said in the Jan. 31 press release.

Chinese cyberattacks against Canada are a key focus of ongoing investigations by a parliamentary committee as well as the current public inquiry into foreign interference. These investigations are examining a 2021 incident involving another Chinese hacker group, known as Advanced Persistent Threat Group 31 (APT31), which targeted members of an international legislative coalition including 18 Canadian parliamentarians.

Luke de Pulford, executive director of the global coalition Inter-Parliamentary Alliance on China (IPAC), testified before the House of Commons Standing Committee on Procedure and House Affairs on the matter on Sept. 26.

He told the committee of the possibility that APT31 hackers obtained the IPAC email distribution list through IPAC volunteer Andy Li. Li, a computer programmer, played a key role in a crowdfunding campaign to rally support for the 2019 pro-democracy movement in Hong Kong. He was later arrested while attempting to flee to Taiwan by speedboat, and reportedly faced torture while imprisoned in China.
"For God has not destined us for wrath, but for obtaining salvation through our Lord Jesus Christ," 1 Thessalonians 5:9

Maranatha!

The Internet might be either your friend or enemy. It just depends on whether or not she has a bad hair day.

[Image: SP1-Scripter.png]
[Image: SP1-Writer.png]
[Image: SP1-Poet.png]
[Image: SP1-PixelArtist.png]
[Image: SP1-Reporter.png]

My Original Stories (available in English and Spanish)

List of Compiled Binary Executables I have published...
HiddenChest & Roole

Give me a free copy of your completed game if you include at least 3 of my scripts! Laughing + Tongue sticking out

Just some scripts I've already published on the board...
KyoGemBoost XP VX & ACE, RandomEnkounters XP, KSkillShop XP, Kolloseum States XP, KEvents XP, KScenario XP & Gosu, KyoPrizeShop XP Mangostan, Kuests XP, KyoDiscounts XP VX, ACE & MV, KChest XP VX & ACE 2016, KTelePort XP, KSkillMax XP & VX & ACE, Gem Roulette XP VX & VX Ace, KRespawnPoint XP, VX & VX Ace, GiveAway XP VX & ACE, Klearance XP VX & ACE, KUnits XP VX, ACE & Gosu 2017, KLevel XP, KRumors XP & ACE, KMonsterPals XP VX & ACE, KStatsRefill XP VX & ACE, KLotto XP VX & ACE, KItemDesc XP & VX, KPocket XP & VX, OpenChest XP VX & ACE
Reply }


Messages In This Thread
Chinese Hackers - by kyonides - 02-19-2020, 05:17 AM
RE: Chinese Hackers - by KDC - 02-19-2020, 08:44 AM
RE: Chinese Hackers - by kyonides - 03-01-2020, 07:31 AM
RE: Chinese Hackers - by kyonides - 03-26-2020, 01:27 AM
RE: Chinese Hackers - by kyonides - 05-03-2020, 05:20 AM
RE: Chinese Hackers - by kyonides - 05-14-2020, 06:18 AM
RE: Chinese Hackers - by kyonides - 05-21-2020, 03:29 AM
RE: Chinese Hackers - by kyonides - 07-07-2020, 06:21 AM
RE: Chinese Hackers - by kyonides - 07-22-2020, 06:33 AM
RE: Chinese Hackers - by kyonides - 08-01-2020, 03:08 AM
RE: Chinese Hackers - by kyonides - 08-20-2020, 05:01 AM
RE: Chinese Hackers - by kyonides - 09-09-2020, 01:36 AM
RE: Chinese Hackers - by kyonides - 09-17-2020, 05:38 AM
RE: Chinese Hackers - by kyonides - 09-26-2020, 05:33 AM
RE: Chinese Hackers - by kyonides - 10-02-2020, 04:21 AM
RE: Chinese Hackers - by kyonides - 10-05-2020, 10:35 PM
RE: Chinese Hackers - by kyonides - 10-08-2020, 05:12 AM
RE: Chinese Hackers - by kyonides - 10-10-2020, 01:16 AM
RE: Chinese Hackers - by kyonides - 10-20-2020, 11:48 PM
RE: Chinese Hackers - by kyonides - 11-18-2020, 04:36 AM
RE: Chinese Hackers - by kyonides - 11-19-2020, 10:36 PM
RE: Chinese Hackers - by kyonides - 11-24-2020, 08:22 AM
RE: Chinese Hackers - by kyonides - 12-18-2020, 01:34 AM
RE: Chinese Hackers - by kyonides - 01-20-2021, 11:33 AM
RE: Chinese Hackers - by kyonides - 03-11-2021, 06:36 AM
RE: Chinese Hackers - by kyonides - 07-21-2021, 07:29 PM
RE: Chinese Hackers - by kyonides - 08-07-2021, 07:38 PM
RE: Chinese Hackers - by kyonides - 03-03-2022, 06:01 AM
RE: Chinese Hackers - by kyonides - 04-04-2022, 07:37 AM
RE: Chinese Hackers - by kyonides - 07-26-2022, 07:09 AM
RE: Chinese Hackers - by kyonides - 08-24-2022, 01:04 AM
RE: Chinese Hackers - by kyonides - 09-01-2022, 04:10 AM
RE: Chinese Hackers - by kyonides - 10-17-2022, 03:50 AM
RE: Chinese Hackers - by kyonides - 11-21-2022, 03:43 AM
RE: Chinese Hackers - by kyonides - 12-15-2022, 02:15 AM
RE: Chinese Hackers - by kyonides - 02-28-2023, 11:50 PM
RE: Chinese Hackers - by kyonides - 03-06-2023, 02:36 AM
RE: Chinese Hackers - by kyonides - 03-09-2023, 07:34 AM
RE: Chinese Hackers - by kyonides - 03-12-2023, 05:45 AM
RE: Chinese Hackers - by kyonides - 03-24-2023, 07:13 PM
RE: Chinese Hackers - by kyonides - 04-03-2023, 07:08 AM
RE: Chinese Hackers - by kyonides - 05-15-2023, 11:43 PM
RE: Chinese Hackers - by kyonides - 06-04-2023, 04:58 AM
RE: Chinese Hackers - by kyonides - 06-16-2023, 11:13 PM
RE: Chinese Hackers - by kyonides - 07-17-2023, 04:52 AM
RE: Chinese Hackers - by kyonides - 07-21-2023, 07:01 AM
RE: Chinese Hackers - by kyonides - 07-25-2023, 07:24 AM
RE: Chinese Hackers - by kyonides - 07-28-2023, 06:51 AM
RE: Chinese Hackers - by kyonides - 08-24-2023, 01:09 AM
RE: Chinese Hackers - by kyonides - 09-12-2023, 06:41 AM
RE: Chinese Hackers - by kyonides - 10-23-2023, 03:49 AM
RE: Chinese Hackers - by kyonides - 12-16-2023, 07:32 AM
RE: Chinese Hackers - by kyonides - 12-31-2023, 01:23 AM
RE: Chinese Hackers - by kyonides - 01-15-2024, 02:03 AM
RE: Chinese Hackers - by kyonides - 02-02-2024, 10:44 PM
RE: Chinese Hackers - by kyonides - 02-06-2024, 07:20 AM
RE: Chinese Hackers - by kyonides - 02-08-2024, 04:38 AM
RE: Chinese Hackers - by kyonides - 02-10-2024, 06:28 AM
RE: Chinese Hackers - by kyonides - 02-19-2024, 04:07 AM
RE: Chinese Hackers - by kyonides - 02-26-2024, 05:24 AM
RE: Chinese Hackers - by kyonides - 03-11-2024, 02:42 AM
RE: Chinese Hackers - by kyonides - 03-29-2024, 06:10 AM
RE: Chinese Hackers - by kyonides - 04-04-2024, 01:59 AM
RE: Chinese Hackers - by kyonides - 04-21-2024, 06:11 AM
RE: Chinese Hackers - by kyonides - 05-10-2024, 08:17 AM
RE: Chinese Hackers - by kyonides - 05-12-2024, 06:12 AM
RE: Chinese Hackers - by kyonides - 06-17-2024, 01:19 AM
RE: Chinese Hackers - by kyonides - 06-25-2024, 07:36 AM
RE: Chinese Hackers - by kyonides - 07-11-2024, 03:16 AM
RE: Chinese Hackers - by kyonides - 08-02-2024, 09:08 AM
RE: Chinese Hackers - by kyonides - 08-25-2024, 11:01 PM
RE: Chinese Hackers - by kyonides - 08-27-2024, 06:10 PM
RE: Chinese Hackers - by kyonides - 09-02-2024, 04:53 AM
RE: Chinese Hackers - by kyonides - 09-18-2024, 01:14 AM
RE: Chinese Hackers - by kyonides - 09-21-2024, 07:57 AM
RE: Chinese Hackers - by kyonides - 09-22-2024, 09:41 PM
RE: Chinese Hackers - by kyonides - 09-30-2024, 01:55 AM
RE: Chinese Hackers - by kyonides - 10-09-2024, 04:55 PM
RE: Chinese Hackers - by kyonides - 10-19-2024, 03:42 AM
RE: Chinese Hackers - by kyonides - 10-28-2024, 01:00 AM



Users browsing this thread: 1 Guest(s)