Share this article

State-Sponsored Chinese Hacking Group Targeting Crypto Firms: Report

An intelligence company released a report indicating the connection between Chinese authorities and a crypto-exploitative hacking collective.

Updated Sep 13, 2021, 11:18 a.m. Published Aug 8, 2019, 1:30 a.m.
mystery hacker

A Chinese espionage operator is attacking crypto firms during state-sponsored campaigns, according to a FireEye Threat Intelligence report published August 2.

The intelligence company “assesses with high confidence” that APT41, a hacking collective, has moved on from financially motivated attacks of video game companies to working alongside the Chinese government. The report was first uncovered by CoinTelegraph.

STORY CONTINUES BELOW
Don't miss another story.Subscribe to the Crypto Daybook Americas Newsletter today. See all newsletters

Reportedly, the hacker group “targets industries in a manner generally aligned with China's Five-Year economic development plans.”

In addition to targeted attacks of healthcare, telecoms, fintech, and film and media companies, evidence suggest APT41 has infiltrated and phished a number of firms operating in the crypto industry.

In June 2018, APT41 sent spear-phishing emails that prompted targets to join a cryptocurrency-denominated decentralized gaming platform to game studios.

Advertisement

The same month, a crypto exchange was targeted by the same email address, reportedly operated by one Tom Giardino.

Furthermore, in at least one instance, the hacking group deployed malicious code that uploads a monero mining bot on a target’s computer, in what is developing into a common form of cyber extortion.

Hacker photo via Shutterstock

More For You

This article is created to test tags being added to image overlays

Consensus 2025: Zak Folkman, Eric Trump

Dek: This article is created to test tags being added to image overlays

需要了解的:

  • Ethena's USDe becomes fifth stablecoin to surpass $10 billion market cap in just 609 days, while Tether's dominance continues to slip.