What's Hot

    I Bombed My First Google Interview and Got in 3 Years Later | Invesloan.com

    March 11, 2026

    Rheinmetall AG GAAP EPS of €22.73, income of €9.94B; introduces FY26 outlook | Invesloan.com

    March 11, 2026

    AI Is Automating Boring, Mundane Work — and Killing Our Creativity | Invesloan.com

    March 11, 2026
    Facebook Twitter Instagram
    Finance Pro
    Facebook Twitter Instagram
    invesloan.cominvesloan.com
    Subscribe for Alerts
    • Home
    • News
    • Politics
    • Money
    • Personal Finance
    • Business
    • Economy
    • Investing
    • Markets
      • Stocks
      • Futures & Commodities
      • Crypto
      • Forex
    • Technology
    invesloan.cominvesloan.com
    Home » Australia accuses China-backed hackers of breaching authorities networks | Invesloan.com
    Business

    Australia accuses China-backed hackers of breaching authorities networks | Invesloan.com

    July 8, 2024
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Unlock the Editor’s Digest for free

    Roula Khalaf, Editor of the FT, selects her favourite stories in this weekly newsletter.

    Australia, backed by allies including the US, UK and Japan, has accused a Chinese state-backed cyber hacking group of targeting the country’s government and private sector networks. 

    The statement on Tuesday was backed by security and intelligence agencies from Five Eyes partner countries the US, UK, Canada and New Zealand as well as Germany, Japan and South Korea, and cited a “shared understanding” of a Chinese “state-sponsored cyber group and their current threat to Australian networks”.

    The intelligence agencies said the group conducted “malicious cyber operations” for China’s Ministry of State Security, adding that its activity and methods overlapped with a group previously identified as Advanced Persistent Threat 40.

    Western intelligence agencies previously have accused APT40, which was reported to be based in China’s southern Hainan province, of infiltrating government agencies, companies and universities in the US, Canada, Europe and the Middle East, under the orders from the ministry.

    “APT40 has repeatedly targeted Australian networks as well as government and private sector networks in the region, and the threat they pose to our networks is ongoing,” the advisory said.

    The Australian Signals Directorate’s move to name APT40 was unprecedented for an Australian authority and came less than a month after China’s Premier Li Qiang visited the country in a reflection of recent efforts to rebuild trade ties. 

    The report marked the latest action by western governments to crack down on Chinese cyber security threats and raise public awareness about the risks of Chinese hacking and espionage.

    In March, the US and UK launched measures against the APT31 hacking group, also run by China’s spy service, which had targeted British parliamentary accounts, critics of the Chinese government and the UK election watchdog. 

    Last year, FBI director Christopher Wray and his Five Eyes counterparts met in Silicon Valley for their first-ever joint public event, where they warned of the risk posed by “unprecedented threat” of Chinese spying to innovative tech sectors from quantum computing to artificial intelligence

    Last month, the Five Eyes warned that the People’s Liberation Army was “aggressively recruiting” western fighter jet pilots to help train Chinese flyers, while the UK and other European countries have made a series of accusations of Chinese agents infiltrating western political systems in recent months.

    Penny Wong, Australia’s foreign minister, said that publicising the allegations against APT40 was in the national interest despite recent efforts to mend relations with Beijing. “We have always said we engage with China without compromising on what is important for Australia and to Australians,” she said in a statement.

    The ASD, which runs the Pacific country’s cyber defences, highlighted two historic breaches perpetrated by APT40 to illustrate the activities of the hacking group.

    Rather than targeting users via “phishing” techniques, the agency said that APT40 exploited vulnerabilities in software developed by companies including Microsoft and Atlassian to breach networks, including home devices, and established a presence within at least one network that was used to steal data and hundreds of passwords. 

    Recommended

    Montage of Google, Sequoia Capital and OpenAi logos over the San Francisco skyline and the Chinese flag

    The ASD said the hacking group regularly conducted reconnaissance against its target networks “to identify vulnerable, end-of-life or no longer maintained devices”, having first achieved success as early as 2017. 

    Australia has increased investment in cyber security since 2022 as part of a wider overhaul of its defence spending and strategy.

    This month, Canberra signed a $1.3bn deal with Amazon to build a defence cloud network to improve its intelligence sharing capabilities with global allies. 

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Keep Reading

    Does personal credit score have a credit score high quality drawback? | Invesloan.com

    Iran battle lifts K-defence firm providing low-cost Patriot rival | Invesloan.com

    Subscribe to learn | Invesloan.com

    Subscribe to learn | Invesloan.com

    Pandemic oil merchants are the GOATs | Invesloan.com

    Subscribe to learn | Invesloan.com

    Subscribe to learn | Invesloan.com

    Subscribe to learn | Invesloan.com

    India cuts telecom spectrum costs as operator curiosity dries up | Invesloan.com

    LATEST NEWS

    I Bombed My First Google Interview and Got in 3 Years Later | Invesloan.com

    March 11, 2026

    Rheinmetall AG GAAP EPS of €22.73, income of €9.94B; introduces FY26 outlook | Invesloan.com

    March 11, 2026

    AI Is Automating Boring, Mundane Work — and Killing Our Creativity | Invesloan.com

    March 11, 2026

    Palantir’s Tech Head Explains How He Manages Star Employees | Invesloan.com

    March 10, 2026
    POPULAR

    China’s first passenger jet completes maiden commercial flight

    May 28, 2023

    Numbers taking US accountancy exams drop to lowest level in 17 years

    May 29, 2023

    Toyota chair faces removal vote over governance issues

    May 29, 2023
    Advertisement
    Load WordPress Sites in as fast as 37ms!
    Facebook Twitter Pinterest WhatsApp Instagram
    © 2007-2023 Invesloan.com All Rights Reserved.
    • Privacy
    • Terms
    • Press Release
    • Advertise
    • Contact

    Type above and press Enter to search. Press Esc to cancel.

    invesloan.com
    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}