www.securitynewspaper.com Open in urlscan Pro
173.255.249.236  Public Scan

URL: https://www.securitynewspaper.com/2021/12/07/how-microsoft-counter-attacked-the-infrastructure-used-by-chinese-military-hackers/
Submission: On December 13 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://www.securitynewspaper.com/

<form method="get" class="searchform" action="https://www.securitynewspaper.com/"><label for="s" class="screen-reader-text">Search</label><i class="fas fa-search"></i><input type="text" class="searchtext" name="s" placeholder="Type Search Term …"
    value=""><input type="submit" class="submit forcehide" name="submit" value="Search"><span class="js-search-placeholder"></span></form>

Text Content

Click Here
How to Clone Voice via WhatsApp Voice Message
Skip to content
Search
Secondary Navigation Menu
Menu
 * Home
 * Data Security
   * Mobile Security
   * Technology
   * Important
 * Vulnerabilities
 * Tutorials
   * Network Tools
     * DNSMap
     * DNSENUM
     * URLCRAZY
     * DNSRECON
     * DNSTRACER
     * TWOFI
     * ONIOFF
     * EXITMAP
     * PROXYCHAINS
     * DIG
     * NSLOOKUP
     * john the ripper
     * P0f
     * Sparta
     * arpSpoof
     * Photon
     * Justsniffer
     * Trevorc2
     * Vemon
     * GoScan
     * Masscan
     * OSNIT-Search
     * nbtstat
   * Web Scanners
     * NIKTO
     * HTTRACK
     * WAPITI
     * Fierce
     * GoBuster
     * w3af
     * DIRBUSTER
     * WPSCAN
     * Joomscan
     * WHATWEB
     * MassBleed
     * CRUNCH
   * Android
     * TheFatRat
     * EvilDroid
     * ANDROID DEBUG BRIDGE(ADB) – Part I
     * ANDROID DEBUG BRIDGE(ADB) – Part II
   * OSINT Tools
     * THEHARVESTER
     * DATASPLOIT
     * recon-ng
     * Babysploit
     * Shodan
     * Trape
     * Infoga
     * Metagoofil
     * Zoomeye
     * Devploit
     * Tinfoleak
     * BadMod
     * H8mail
     * Stardox
   * CTF Tools
   * CTF Challenges
     * Mr. Robot 1, walk through
   * DDoS Tools
   * Defense Evasion Tools
     * Getwin
   * Forensics
     * Steghide LSBstege
     * knock
   * Hash Cracking Hacking Tools
     * twofi
     * John the Ripper
     * Crunch
   * Linux Utilities
     * Terminator
     * Procdump
     * Termshark
   * Malware Analysis
     * AUTOMATER
     * Shed
   * Reverse Engineering Tools
   * Anonymity Tools
     * onioff
     * Proxychains
     * Exitmap
     * Deep Explorer
     * Hosting your own .onion domain
     * Send Anonymous Emails
     * OnionShare – startup in dark web
   * Vulnerability Scanners
     * Pocsuite
     * Mercury
     * Jok3r
     * FreeVulnsearch
     * Pompem
     * Phantom Evasion
   * Web Exploitation
     * XSS Shell
     * Wafw00f
     * Remote3d
   * Web Scanners
   * Windows Utilities
     * ENUM4LINUX
     * NETBIOS ENUMERATOR
     * Medusa
   * Wireless Hacking
     * Wigle
     * WiFiBroot
     * Hashcat
     * Aircrack-ng
   * Social Engineering Tools
     * blackeye
     * Seeker
     * BYOB
     * QRLJacker
     * phemail
     * Cuteit
     * Spooftel
 * Incidents
 * Malware
 * News Videos

 * 
 * 
 * 
 * 


HOW MICROSOFT COUNTER ATTACKED THE INFRASTRUCTURE USED BY CHINESE MILITARY
HACKERS

Share this...

Facebook
Twitter
Linkedin
Pinterest
Reddit

As part of an ambitious security effort, Microsoft took control of dozens of
malicious sites allegedly operated by Nickel, a China-based hacking group.
Apparently, these platforms were used to direct attacks against critical
infrastructure in the United States and at least 28 other countries, mainly in
Latin America and Europe.

Tom Burt, Vice President of Customer Security and Trust at Microsoft, said,
“Nickel has focused its efforts on public and private organizations, including
diplomatic entities and foreign ministries in North America, Central America,
South America, the Caribbean, Europe and Africa.”




The tech giant was able to take down the hackers’ infrastructure after a U.S.
court issued an order stemming from the group’s actions. This order mentions
that malicious websites were to be switched to secure servers, changing
authorized name servers to NS104a.microsoftintemetsafety.net and
NS104b.microsoftintemetsafety.net.

SOURCE: Microsoft

Microsoft’s security teams first detected the malicious behavior in 2016, while
security firms such as Mandiant say Nickel’s existence is set back to 2010. In
addition, for a couple of years the presence of this group was detected in
attacks against European and Latin American countries, mainly operating malware
delivery campaigns for network monitoring and data theft.



Nickel’s operations are funded by Chinese government and use previously
compromised third-party VPN platforms, stolen credentials in phishing campaigns,
and exploits targeting undated Exchange Server and SharePoint servers.

Since the investigation began, 24 criminal cases have been drawn up against
these hackers and five against their sponsors, in addition to the removal of
nearly 10,000 malicious websites and more than 500,000 online platforms
potentially associated with this operation have been blocked.

Microsoft has made considerable efforts in the fight against cybercrime; A few
months ago, the company seized the computing infrastructure of the Necurs
botnet, used by threat actors for the distribution of malware payloads, which
put millions of devices around the world at risk. According to Microsoft, at its
highest point of activity Necurs was able to reach more than 40 million targets
in less than two months.

To learn more about information security risks, malware variants,
vulnerabilities and information technologies, feel free to access the
International Institute of Cyber Security (IICS) websites.


Previous


HOW TO DO AUTOMATIC VULNERABILITY ANALYSIS AND ASSESSMENT OF YOUR APPLICATIONS &
NETWORK FREE OF COST?


HOW TO DO DIGITAL FORENSICS AND REVERSE ENGINEERING ON WINDOWS REGISTRIES WITH
FREE REGRIPPER TOOL


HOW TO EASILY COPY FACEBOOK, INSTAGRAM, TWITTER GMAIL COOKIES AND BROWSER STORED
PASSWORDS TO A USB PENDRIVE, ALL WITH JUST 15 COMMANDS


HOW TO PERFORM DIGITAL FORENSICS OF MALICIOUS PDF FILES? EASILY CHECKING IF A
PDF DOCUMENT HAS MALWARE OR BACKDOORS


TOP 6 TOOLS USED BY HACKERS FOR STEALING WINDOWS DOMAIN CACHE CREDENTIALS. 5
ALTERNATIVES OF MIMIKATZ


HOW TO DO PENETRATION TESTING OF IOT DEVICES EASILY


HOW TO DO DIGITAL FORENSICS OF A HACKED NETWORK WITH TCPDUMP


HOW TO HACK INTO WAF (WEB APPLICATION FIREWALL) USING XSS ATTACKS?


HOW TO DO AUTOMATIC VULNERABILITY ANALYSIS AND ASSESSMENT OF YOUR APPLICATIONS &
NETWORK FREE OF COST?


HOW TO DO DIGITAL FORENSICS AND REVERSE ENGINEERING ON WINDOWS REGISTRIES WITH
FREE REGRIPPER TOOL


HOW TO EASILY COPY FACEBOOK, INSTAGRAM, TWITTER GMAIL COOKIES AND BROWSER STORED
PASSWORDS TO A USB PENDRIVE, ALL WITH JUST 15 COMMANDS


HOW TO PERFORM DIGITAL FORENSICS OF MALICIOUS PDF FILES? EASILY CHECKING IF A
PDF DOCUMENT HAS MALWARE OR BACKDOORS


TOP 6 TOOLS USED BY HACKERS FOR STEALING WINDOWS DOMAIN CACHE CREDENTIALS. 5
ALTERNATIVES OF MIMIKATZ


HOW TO DO PENETRATION TESTING OF IOT DEVICES EASILY

Next
Octavio Mares

He is a well-known expert in mobile security and malware analysis. He studied
Computer Science at NYU and started working as a cyber security analyst in 2003.
He is actively working as an anti-malware expert. He also worked for security
companies like Kaspersky Lab. His everyday job includes researching about new
malware and cyber security incidents. Also he has deep level of knowledge in
mobile security and mobile vulnerabilities.



Share this...

Facebook
Twitter
Linkedin
Pinterest
Reddit
2021-12-07
On: December 7, 2021
In: Technology
Tagged: advanced persistent threat (APT), botnet, China, Cyberattack,
cybersecurity, Hacking, Hacking Tools, incidents, Information Security, malware,
Microsoft, Nickel, technology, threat actors, United States, virtual private
network (VPN)


LATEST VIDEOS

HOW CHINESE APT HACKERS STOLE LOCKHEED MARTIN F-35 FIGHTER PLANE TO DEVELOP ITS
OWN J-20 STEALTH FIGHTER AIRCRAFT [VIDEO]



NIGERIA SPENDS MORE THAN ANY OTHER AFRICAN COUNTRY IN SPYING ITS CITIZENS



HOW TO HACK BANK’S VOICE RECOGNITION SYSTEM – VOICE BIOMETRICS WITH DEEPFAKE
VOICE CLONING



STEP BY STEP PROCESS OF HACKING ATMS USING BLACK BOX. ATM JACKPOTTING



HOW TO ORGANIZE A PROTEST ANONYMOUSLY: RAISE YOUR VOICE AGAINST GOVERNMENT AND
PROTEST WITHOUT BEING ARRESTED



View All


POPULAR POSTS:

 * How to fake your phone number: Make it look like…
 * Create phishing page of 29 websites in minutes.
 * Hack Whatsapp account of your friend
 * How to intercept mobile communications (calls and…
 * Fake any website in seconds Facebook, Snapchat, Instagram :-
 * CREATE YOUR OWN WORDLIST WITH CRUNCH
 * Fake text message attack. How Prank or hack your…
 * List of all Open FTP Servers in the World
 * Crack Windows password with john the ripper
 * Hack WhatsApp of your Friend by sending a Single Link
 * How to Check if your Mobile phone is hacked or not?
 * How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using…
 * Anyone Can Hack Mobile Whatsapp Using These Top 5 Tricks
 * How to exploit new Facebook feature to access…
 * Hack any website with All in One Tool
 * Hack Windows, Android, Mac using TheFatRat (Step by…
 * Create your own BotNet (Step By Step tutorial)
 * FireEye confirms that APT41 Group hacked TeamViewer;…
 * How to hack Instagram accounts from a smartphone…
 * See how to Search username, passwords, configuration…
 * TOP 6 Hacking mobile Apps – must have
 * Do Hacking with Simple Python Script
 * How to scan whole Internet 3.7 billion IP addresses…
 * Generate Android App in 2 mins and hack any android mobile
 * List of credit cards, proxies on Deep Web





VULNERABILITIES

ZERO-DAY VULNERABILITY IN LOG4J AFFECTS MILLIONS OF APACHE, MINECRAFT AND OTHER
APPLICATIONS USERS; EXPLOIT CODE PUBLISHED



IN 2021 MAXIMUM SECURITY VULNERABILITIES WERE REPORTED AS COMPARED TO PAST
ACCORDING TO NIST



INFORMATION DISCLOSURE VULNERABILITY IN FORTISANDBOX, FORTIWEB AND FORTIADC:
PATCH IMMEDIATELY



IMPORTANT PRIVILEGE ESCALATION FLAW IN SONICWALL GLOBAL VPN CLIENT: PATCH
IMMEDIATELY



RCE, CSRF AND OTHER CRITICAL VULNERABILITIES IN FORTIOS AND FORTIPROXY AFFECT
VARIOUS FORTINET PRODUCTS



View All


TUTORIALS

HOW TO PERFORM DIGITAL FORENSICS OF MALICIOUS PDF FILES? EASILY CHECKING IF A
PDF DOCUMENT HAS MALWARE OR BACKDOORS



TOP 6 TOOLS USED BY HACKERS FOR STEALING WINDOWS DOMAIN CACHE CREDENTIALS. 5
ALTERNATIVES OF MIMIKATZ



HOW TO DO PENETRATION TESTING OF IOT DEVICES EASILY



HOW TO DO DIGITAL FORENSICS OF A HACKED NETWORK WITH TCPDUMP



HOW TO HACK INTO WAF (WEB APPLICATION FIREWALL) USING XSS ATTACKS?



HOW TO DO AUTOMATIC VULNERABILITY ANALYSIS AND ASSESSMENT OF YOUR APPLICATIONS &
NETWORK FREE OF COST?



HOW TO DO DIGITAL FORENSICS AND REVERSE ENGINEERING ON WINDOWS REGISTRIES WITH
FREE REGRIPPER TOOL



HOW TO EASILY COPY FACEBOOK, INSTAGRAM, TWITTER GMAIL COOKIES AND BROWSER STORED
PASSWORDS TO A USB PENDRIVE, ALL WITH JUST 15 COMMANDS



HOW TO HACK WPA2-PSK WIFI PASSWORDS EASILY WITH JUST 10 COMMANDS USING THIS TOOL



8 TECHNIQUES TO PROTECT YOUR WINDOWS NETWORK DOMAINS AGAINST MIMIKATZ CREDENTIAL
STEALING TOOL



View All


MALWARE

17 MALICIOUS PACKAGES IN THE NODE.JS PACKAGE MANAGER (NPM) CODE REPOSITORY WERE
LOOKING TO HARVEST DISCORD TOKENS



YOUTUBE SEARCH OF FREE GAMES SHOW TROJAN LINKS. BE CAREFUL WHEN TRYING OUT THE
GAMES



TARDIGRADE: THE NEW MALWARE THAT ONLY TARGETS MEDICINE AND VACCINE MANUFACTURING
PLANTS



NEW RESEARCH: MILLIONS OF HUAWEI SMARTPHONES ARE INFLECTED WITH MALWARE



LARGEST BOTNET WITH CONTROL OF MILLIONS OF DEVICES DISCOVERED. THE PINK BOTNET



View All


CYBER SECURITY CHANNEL

HOW TO HACK BANK’S VOICE RECOGNITION SYSTEM – VOICE BIOMETRICS WITH DEEPFAKE
VOICE CLONING

STEP BY STEP PROCESS OF HACKING ATMS USING BLACK BOX. ATM JACKPOTTING

HOW TO ORGANIZE A PROTEST ANONYMOUSLY: RAISE YOUR VOICE AGAINST GOVERNMENT AND
PROTEST WITHOUT BEING ARRESTED

 * 
 * 
 * 
 * 
 * 

info@securitynewspaper.com    Privacy Policy


Posting....
We use cookies to ensure that we give you the best experience on our website. If
you continue to use this site we will assume that you are happy with it.Ok