Even Two-Factor Authentication Couldn't Stop Chinese Hackers
Dhir Acharya
The Chinese hacking group, called APT20, targeted over 10 countries across the globe in recent attacks. Even the US got attacked by the hackers.
- Google to Phase Out SMS-Based Authentication Codes
- Hackers Purposely Upload Their Fingerprints To Crime Scene - One Of The Dumbest Hacks Ever
- Biggest Shame Of The Year: Iranian Hackers Accidentally Leaked Videos Showing Them Hacking
A hacking group from China that’s believed to work for the Beijing government has learned to bypass two-factor authentication in their attacks aimed at industry and government targets, according to a Mondy report on the hackers from ZDNet.
The group in question is called APT20. By figuring out a way to compromise VPN credentials, the hackers managed to obtain higher levels of access on the networks of their victims, ZDNet cited a report from Fox-IT, a Dutch cyber-security company.
Attempts to bypass two-factor authentication is nothing new, but it is so sophisticated that this kind of attack is quite rare. It remains unclear how the group succeeded, but there’s one theory reported by ZDNet:
According to Fox-IT, the group might have developed the technique to bypass themselves. APT20 successfully stayed off the radar using legitimate channels like VPN access as they carried out the attacks.
The report says that the group’s victims are in multiple countries, government entities, service providers as well as in various industries, which include High-Tech, Health Care, and Energy. There were over ten countries targeted in these attacks such as the US, the UK, Spain, Portugal, Mexico, Italy, Germany, France, China, and Brazil.
Once the group has acquired initial access, they move laterally by applying custom backdoors on several servers, according to the researchers. From there, they begin to collect the sensitive data it wants, or more credentials to help with elevating the access. When they’re done, they delete their tools, compressed files they created for extraction for forensic investigations.
Featured Stories
Features - Feb 26, 2025
Elon Musk Eyes Indian Market: Tesla’s Next Big Move?
Features - Aug 03, 2023
The Impact of Social Media on Online Sports Betting
Features - Jul 10, 2023
5 Most Richest Esports Players of All Time
Features - Jun 07, 2023
Is it safe to use a debit card for online gambling?
Features - May 20, 2023
Everything You Need to Know About the Wisconsin Car Bill of Sale
Features - Apr 27, 2023
How to Take Advantage of Guarantee Cashback in Online Bets
Features - Mar 08, 2023
White Label Solutions for Forex
Review - Jul 15, 2022
WHY BETTING SIGNUP OFFERS ARE IMPORTANT FOR NEW GAMBLERS
Mobile - Jul 01, 2022
The Best Sports Video Games to Play in 2022
Features - Apr 28, 2022
Could Blockchain Be the Answer to Fortified Data Security?
Read More
How To- Mar 31, 2025
Elevate Your Online Presence: Partnering with a Small Business Digital Marketing Agency
In today's digital age, establishing a robust online presence is imperative for the success of any small business.
Mobile- Apr 01, 2025
How to Fake GPS Location on iPhone or Android
If you’re looking for the best fake GPS app for Android or a reliable fake GPS for iPhone, MagFone Location Changer is a top choice. It provides one-click location spoofing, route simulation, and works seamlessly with popular apps.