NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware
4 Articles
4 Articles
NightEagle hackers exploit Microsoft Exchange flaw to spy on China’s strategic sectors
A previously undocumented Advanced Persistent Threat (APT) group, “NightEagle,” has been found targeting the Chinese government and critical sectors using an unidentified Microsoft Exchange zero-day flaw. According to a discovery made by RedDrip, the threat intelligence unit of Chinese cybersecurity firm QiAnXin Technology, the threat group has been compromising Microsoft Exchange servers through a sophisticated zero-day exploit chain to steal c…
NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware
A sophisticated APT group dubbed “NightEagle” (APT-Q-95) has been conducting targeted attacks against China’s critical technology sectors since 2023. The group has demonstrated exceptional capabilities in exploiting unknown Exchange vulnerabilities and deploying adaptive malware to steal sensitive intelligence from high-tech… Read more → The post NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware appeared…
NightEagle APT Attacking Industrial Systems By Exploiting 0-Days And With Adaptive Malware - Cybernoz - Cybersecurity News
A sophisticated APT group dubbed “NightEagle” (APT-Q-95) has been conducting targeted attacks against China’s critical technology sectors since 2023. The group has demonstrated exceptional capabilities in exploiting unknown Exchange vulnerabilities and deploying adaptive malware to steal sensitive intelligence from high-tech companies, chip semiconductor manufacturers, quantum technology firms, artificial intelligence developers, and military i…
Coverage Details
Bias Distribution
- There is no tracked Bias information for the sources covering this story.
To view factuality data please Upgrade to Premium