Info@NationalCyberSecurity
Info@NationalCyberSecurity

Hacker Offers Access To Top China Real Estate Company | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


A hacker, cloaked in anonymity, asserted that they had illicitly obtained Remote Desktop Protocol (RDP) access to a prominent Chinese real estate firm through the cyber black market.

The identity of the company remains undisclosed, but it commands a substantial revenue exceeding US$35 billion, rendering it a highly desirable target for cybercriminals.

What’s even more alarming is that the starting price for this illicit access is a mere US$10,000. Moreover, the lack of disclosure regarding the company’s identity adds a layer of intrigue, amplifying the gravity of the situation.

The sale of unauthorized RDP access highlights the increasingly sophisticated tactics employed by cybercriminals to infiltrate high-value targets. RDP, a proprietary protocol developed by Microsoft, allows users to remotely access computers over a network connection.

While it serves as a convenient tool for legitimate remote access, it has also become a prime target for cyberattacks when left unprotected.

Source: Daily Dark Web

The implications of such a cyberattack extend far beyond financial losses for the company involved. With access to sensitive internal systems and data, malicious actors could wreak havoc on operations, compromise confidential information, and even sabotage critical infrastructure. For a real estate giant of this magnitude, the potential fallout from such a breach could be catastrophic.

Cyber Warfare: A Persistent Threat to China

This latest incident adds to a series of cybersecurity challenges plaguing the nation. The recent annual report by Chinese cybersecurity firm 360 Security Group, released in January 2024 reveals some shocking numbers. The report reveals a disturbing trend of over 1,200 Advanced Persistent Threat (APT) attacks originating from 13 foreign APT organizations targeting China in 2023 alone.

These sophisticated cyber assaults spanned across 16 industries, with education emerging as the primary target, followed closely by government, scientific research, national defense, and transportation sectors.

Government Responses and International Ramifications

Amidst these mounting cybersecurity concerns, the Chinese government, in February 2024, has taken a firm stance, unequivocally denouncing any form of cyber aggression. Reaffirming its commitment to combatting cyber threats, the Chinese embassy in the Philippines issued a stern warning, asserting that China will not tolerate illicit cyber activities leveraging its infrastructure.

This declaration comes in the wake of reports suggesting an attempted cyberattack on Philippine government websites, allegedly orchestrated by hackers utilizing services provided by Chinese state-owned enterprise Unicom.

Meanwhile, across the Pacific, the United States grapples with its own cybersecurity challenges, with officials and experts sounding the alarm on alleged attempts by the Chinese military to infiltrate vital infrastructure networks. Reports citing anonymous sources suggest that hackers affiliated with China’s People’s Liberation

Army successfully penetrated the computer systems of numerous critical organizations, signaling a potentially grave threat to national security.

The recent revelations have thrust China into the spotlight once again, raising concerns about unauthorized access to sensitive data and allegations of state-sponsored cyberattacks.

As tensions simmer between the world’s two largest economies, cybersecurity emerges as a focal point of contention, necessitating robust defenses and proactive measures to mitigate risks and safeguard against malicious cyber activities.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

!function(f,b,e,v,n,t,s)
{if(f.fbq)return;n=f.fbq=function(){n.callMethod?
n.callMethod.apply(n,arguments):n.queue.push(arguments)};
if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version=’2.0′;
n.queue=[];t=b.createElement(e);t.async=!0;
t.src=v;s=b.getElementsByTagName(e)[0];
s.parentNode.insertBefore(t,s)}(window, document,’script’,
‘https://connect.facebook.net/en_US/fbevents.js’);
fbq(‘init’, ‘5969393309772353’);
fbq(‘track’, ‘PageView’);

(function(c,l,a,r,i,t,y){
c[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};
t=l.createElement(r);t.async=1;t.src=”https://www.clarity.ms/tag/”+i;
y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);
})(window, document, “clarity”, “script”, “f1dqrc05x2”);

——————————————————–


Click Here For The Original Story From This Source.

.........................

National Cyber Security

FREE
VIEW