• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Device security Intruders Latest Cybersecurity News What is

Chinese APT41 hackers breached into Six U.S. State Organizations

William Marshal Posted On March 9, 2022
0



Chinese APT41 hackers

The Chinese APT41 hackers, a state-sponsored threat entity of China had breached into at least six U.S state government environment from May 2021 to February 2022 by redefining their attack vectors and exploiting the existing vulnerabilities in the victim’s web applications.

Who are Chinese APT41 hackers?

A state-sponsored hacking group that is hacking organizations across the world and mostly US with strong ties to China, classified as Advanced Persistent Threat (APT), as named by the US Department of Justice is called Double Dragon a.k.a APT41. They also go by other names like Barium, Wicked Panda, Wicked Spider, Bronze Atlas, Blackfly, Red Kelpie and TG-2633.

On January 2022, a similar entity was found targeting financial entities and was seen by the name Earth Lusca. Security researchers suspected Earth Lusca and APT41 has lot of similar attacking vectors and patterns, which raised a suspicion that they aren’t separate threat entities.

In the year 2020, the threat actors were linked to several intrusion campaign including Citrix NetScaler/ADC, ManageEngine Desktop Central, and Cisco Routers as these tools are widespread and can affected  users across 20+ countries.

Attack vectors employed by Chinese APT41 hackers

As per Mandiant’s researchers, the vulnerabilities are zero-days in the USAHERDS application that is marked as CVE-2021-44207, the infamous Log4j marked as CVE-2021-44228 and named them to be ‘deliberate campaign’. The attackers are known for persistent attacks that involve the weaponization of abusing deserialization, directory traversal vulnerabilities, and SQL injection.

The Chinese APT41 hackers are known to be targeting both the public and private entities to perform espionage acts with financial gains. The recent act of these malicious actors include exploiting the Log4Shell vulnerability to gain access into targeted networks of two U.S state governments, a telecom firm and an insurance company.

Chinese APT41 hackers
Source: Mandiant

Later, the hackers went ahead to deploy a new malware variant of modular C++ backdoor called KEYPLUG on Linux devices after harvesting and reconnaissance of those victim networks. Once successfully deployed, the next payload called DUSTPAN (aka StealthVector) is deployed for in-memory drop with advanced post-compromise tools like DEADEYE which launches the LOWKEY. APT41 hackers are fond of using Cloudfare services said the Mandiant researcher as the actors have been seen using the same attack orchestration techniques in multiple instances.

Chinese APT hackers and U.S Department of Justice

APt41 hackers have been on the most wanted list of the FBI as they have been accused of multiple Healthcare, High-tech, Financial and Telecom organizations over the years. APT31 and APT41 are very active recently and their prime targets are usually US organizations.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends


APT41 hackersChinese APT41 hackersChinese hackersCyberattack


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

You may also like
Russian Hackers APT29 Exploits WinRAR Vulnerability
November 18, 2023
The Israel-Palestine Cyber Conflict Unveiled
October 10, 2023
Novel Social Engineering Attacks Increase by 135% with Generative AI Uptake
April 6, 2023
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search