Even Two-Factor Authentication Couldn't Stop Chinese Hackers
Dhir Acharya
The Chinese hacking group, called APT20, targeted over 10 countries across the globe in recent attacks. Even the US got attacked by the hackers.
- Google to Phase Out SMS-Based Authentication Codes
- Hackers Purposely Upload Their Fingerprints To Crime Scene - One Of The Dumbest Hacks Ever
- Biggest Shame Of The Year: Iranian Hackers Accidentally Leaked Videos Showing Them Hacking
A hacking group from China that’s believed to work for the Beijing government has learned to bypass two-factor authentication in their attacks aimed at industry and government targets, according to a Mondy report on the hackers from ZDNet.
The group in question is called APT20. By figuring out a way to compromise VPN credentials, the hackers managed to obtain higher levels of access on the networks of their victims, ZDNet cited a report from Fox-IT, a Dutch cyber-security company.
Attempts to bypass two-factor authentication is nothing new, but it is so sophisticated that this kind of attack is quite rare. It remains unclear how the group succeeded, but there’s one theory reported by ZDNet:
According to Fox-IT, the group might have developed the technique to bypass themselves. APT20 successfully stayed off the radar using legitimate channels like VPN access as they carried out the attacks.
The report says that the group’s victims are in multiple countries, government entities, service providers as well as in various industries, which include High-Tech, Health Care, and Energy. There were over ten countries targeted in these attacks such as the US, the UK, Spain, Portugal, Mexico, Italy, Germany, France, China, and Brazil.
Once the group has acquired initial access, they move laterally by applying custom backdoors on several servers, according to the researchers. From there, they begin to collect the sensitive data it wants, or more credentials to help with elevating the access. When they’re done, they delete their tools, compressed files they created for extraction for forensic investigations.
Featured Stories
Features - Jul 01, 2025
What Are The Fastest Passenger Vehicles Ever Created?
Features - Jun 25, 2025
Japan Hydrogen Breakthrough: Scientists Crack the Clean Energy Code with...
ICT News - Jun 25, 2025
AI Intimidation Tactics: CEOs Turn Flawed Technology Into Employee Fear Machine
Review - Jun 25, 2025
Windows 11 Problems: Is Microsoft's "Best" OS Actually Getting Worse?
Features - Jun 22, 2025
Telegram Founder Pavel Durov Plans to Split $14 Billion Fortune Among 106 Children
ICT News - Jun 22, 2025
Neuralink Telepathy Chip Enables Quadriplegic Rob Greiner to Control Games with...
Features - Jun 21, 2025
This Over $100 Bottle Has Nothing But Fresh Air Inside
Features - Jun 18, 2025
Best Mobile VPN Apps for Gaming 2025: Complete Guide
Features - Jun 18, 2025
A Math Formula Tells Us How Long Everything Will Live
Features - Jun 16, 2025