China's APT 31 Repurposed NSA Hacking Tool Before Shadow Brokers Leak
Bill creating State Dept to be introduced, Fin11 hacking group behind Accellion hacks, Apple makes zero-click exploits harder, Hyundai files leaked after KIA ransomware attack, much more
(Plug: Check out my latest CSO column that examines New York’s new cyber insurance risk framework that was introduced just as costs mount due to ransomware’s ongoing rise and the considerable expenses of the SolarWinds breach.)
While you’re here, ask your organization’s administrative offices if they would like to sign up for a bulk subscription to Metacurity at half off the individual subscription price!
Security firm Check Point revealed that it had discovered evidence that a Chinese group known as APT31, also known as Zirconium or Judgment Panda, obtained and reused another NSA hacking tool known as EpMe years before the mysterious group of hackers known as Shadow Brokers leaked hacking tools from NSA’s elite Equation Group on the web.
In 2014, the Chinese group built its own hacking tool from EpMe code, which originated from the NSA’s Equation Group in 2013. (Andy Greenberg / Wired)
Related: ZDNet Security, Check Point, The Hacker News, Reuters, Startups News | Tech News, Security A…
Keep reading with a 7-day free trial
Subscribe to Metacurity to keep reading this post and get 7 days of free access to the full post archives.