Skip to content

Panopticon-Project/panopticon-China

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 

Repository files navigation

panopticon-China

https://www.wired.com/story/us-china-cybertheft-su-bin/

http://www.bbc.com/news/technology-40885723

http://blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html apt 17

https://www.stuff.co.nz/business/97090218/chineseowned-ashburton-dairy-farm-space-programme-under-academic-spotlight?utm_source=ST&utm_medium=email&utm_campaign=ShareTrader+AM+Update+for+Friday+22+September+2017

http://www.securityweek.com/cyber-attacks-targeted-interests-billionaire-chinese-dissident

https://krebsonsecurity.com/tag/terracotta-vpn/

https://www.scientificamerican.com/article/how-the-chinese-cyberthreat-has-evolved/?sf119970396=1&utm_source=hs_email&utm_medium=email&utm_content=57128102&_hsenc=p2ANqtz-8TLRSak8yOrMoGTy8Fd4X7vunayoFqP-jYHdYlQRpPIiDDOEN-SjQ9Tg7dTfuor_wwVIWhnew0HIJdmfjooxbNrDTE4w&_hsmi=57128102

https://blog.lookout.com/mobile-threat-jaderat

http://www.securityweek.com/china-may-delay-vulnerability-disclosures-use-attacks

http://www.securityweek.com/chinese-cyberspies-deliver-new-malware-cpl-files

https://www.wired.com/story/china-tests-limits-of-us-hacking-truce/?mbid=nl_103117_daily_list3_p2

www.securityweek.com/china-has-shut-down-13000-websites-2015-xinhua

http://www.zdnet.com/article/australian-universities-and-ngos-targeted-by-iranian-and-chinese-hackers/#ftag=RSSbaffb68

https://www.darkreading.com/vulnerabilities---threats/chinas-vulnerability-database-altered-to-hide-govt-influence/d/d-id/1331235

https://www.securityweek.com/us-military-bans-huawei-zte-phones

https://www.securityweek.com/chinese-government-hackers-steal-trove-us-navy-data-report

https://www.wired.com/story/china-hacks-against-united-states/?CNDID=53659400&mbid=nl_062218_daily_list1_p4

https://www.securityweek.com/cyber-espionage-campaigns-target-tibetan-community-india

https://www.securityweek.com/china-used-tiny-chips-us-computers-steal-secrets-report

https://www.wired.com/story/us-china-cybertheft-su-bin/?CNDID=53659400&CNDID=53659400&mbid=nl_101118_daily_list1_p4&utm_brand=wired&utm_mailing=WIRED%20NL%20101118%20(1)%20remainder&utm_medium=email&utm_source=nl

https://www.wired.com/story/china-spy-recruitment-us/?

https://www.securityweek.com/us-believes-chinese-intelligence-behind-marriott-hack

https://www.securityweek.com/united-states-and-china-different-kind-cyberwar

https://www.youtube.com/watch?time_continue=4&v=psqQimMZeTQ

https://www.securityweek.com/new-luckycat-linked-rat-targets-users-tibet

https://medium.com/dfrlab/made-in-china-economic-influence-operations-733fb07bdc87

https://www.zdnet.com/article/chinese-company-leaves-muslim-tracking-facial-recognition-database-exposed-online/

https://www.securityweek.com/finland-investigate-suspected-nokia-chinese-data-breach

https://medium.com/the-new-york-times/one-month-500-000-face-scans-how-china-is-using-a-i-to-profile-a-minority-b49e93d5a9d3

https://www.securityweek.com/researchers-link-disparate-chinese-hacking-groups

https://www.securityweek.com/telegram-hit-cyber-attack-ceo-points-hk-protests-china

https://www.wired.com/story/inside-chinas-massive-surveillance-operation/

https://www.securityweek.com/xinjiang-surveillance-app-targets-legal-everyday-behaviour-rights-group

https://www.vice.com/en_us/article/7xgame/at-chinese-border-tourists-forced-to-install-a-text-stealing-piece-of-malware

https://github.com/motherboardgithub/bxaq

https://www.recordedfuture.com/malign-influence-during-the-2022-us-midterm-elections-disinformation-misinformation

https://www.wired.com/story/china-social-credit-score-system/

https://www.securityweek.com/chinese-cyberspies-continue-targeting-medical-research-organizations

https://www.securityweek.com/twitter-shuts-chinese-accounts-targeting-hong-kong-protests

https://www.securityweek.com/twitter-flexing-its-muscles-against-state-misinformation

https://www.wired.com/story/china-twitter-facebook-hong-kong-protests-disinformation/

https://www.vice.com/en_us/article/bjwne5/malicious-websites-hacked-iphones-for-years

https://medium.com/dfrlab/twitters-hong-kong-archives-chinese-commercial-bots-at-work-f4c7ae8eea64

https://www.wired.com/story/behind-rise-chinas-facial-recognition-giants/?

https://www.wired.com/story/tiktok-is-the-latest-window-into-chinas-police-state/

https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html

https://www.apple.com/newsroom/2019/09/a-message-about-ios-security/

https://www.cyberscoop.com/hong-kong-disinfo-campaign-graphika/

https://intrusiontruth.wordpress.com/2020/01/09/what-is-the-hainan-xiandun-technology-development-company/

https://au.pcmag.com/news/65850/china-has-been-censoring-coronavirus-information-for-months

https://www.forbes.com/sites/zakdoffman/2019/07/06/iranian-cyber-threat-heightened-by-chinas-support-for-its-cyber-war-on-u-s/#765e719642eb

https://www.securityweek.com/us-says-chinese-hacking-vaccine-research-reports

https://www.us-cert.gov/ncas/current-activity/2020/05/13/cisa-fbi-joint-announcement-prc-targeting-covid-19-research

https://www.wired.com/story/inside-chinas-massive-surveillance-operation/

https://www.cyberscoop.com/chinese-hackers-accused-targeting-coronavirus-vaccine-research/ - figure out which APT

https://blog.malwarebytes.com/threat-analysis/2020/07/chinese-apt-group-targets-india-and-hong-kong-using-new-variant-of-mgbot-malware/

https://www.zdnet.com/article/chinese-hackers-blamed-for-the-spread-of-mgbot-across-india-hong-kong/

https://www.indiatoday.in/world/story/inside-china-s-cyber-war-room-how-pla-is-plotting-global-attacks-1708292-2020-08-06

https://www.theregister.com/2020/09/02/sepulcher_malware/

https://www.bleepingcomputer.com/news/security/us-govt-china-sponsored-hackers-targeting-exchange-citrix-f5-flaws/

https://www.cyberscoop.com/chinese-hacking-us-telecoms/

https://www.securityweek.com/sophisticated-chinese-apt-group-targets-southeast-asian-governments

https://www.securityweek.com/nsa-lists-25-vulnerabilities-currently-targeted-chinese-state-sponsored-hackers

https://www.cyberscoop.com/china-biden-influence-operations-evanina/

https://www.theregister.com/2020/10/05/uefi_rootkit_kaspersky_china/

https://www.securityweek.com/facebook-says-fake-accounts-china-aimed-us-politics

https://us-cert.cisa.gov/ncas/current-activity/2020/09/14/chinese-government-affiliated-malicious-cyber-actors-targeting-us

https://www.theregister.com/2021/03/01/statesponsored_chinese_group_attacked_india/

https://www.hackread.com/facebook-removes-accounts-spread-ios-android-malware/

https://www.wired.com/story/the-full-story-of-the-stunning-rsa-hack-can-finally-be-told/

https://securelist.com/operation-tunnelsnake-and-moriya-rootkit/101831/

https://intrusiontruth.wordpress.com/2021/05/06/an-apt-with-no-name/

https://www.cyberscoop.com/belgium-cyber-espionage-china-microsoft-exchange/

https://www.technadu.com/chinese-hackers-caught-using-un-website-target-uyghur-muslims/279523/

https://blog.checkpoint.com/2021/06/03/chinese-apt-group-targets-southeast-asian-government-with-previously-unknown-backdoor/

https://www.securityweek.com/critical-entities-targeted-suspected-chinese-cyber-spying

https://cset.georgetown.edu/publication/academics-ai-and-apts/

https://www.securityweek.com/microsoft-says-solarwinds-serv-u-zero-day-exploited-chinese-group

https://www.washingtonpost.com/national-security/microsoft-hack-china-biden-nato/2021/07/19/a90ac7b4-e827-11eb-84a2-d93bc0b50294_story.html

https://www.securityweek.com/us-government-attributes-ics-attacks-russia-china-iran

https://media.defense.gov/2021/Jul/19/2002805003/-1/-1/1/CSA_CHINESE_STATE-SPONSORED_CYBER_TTPS.PDF

https://www.theregister.com/2021/07/19/hafnium_china_state_security/

https://www.nsa.gov/news-features/press-room/Article/2698416/nsa-cisa-and-fbi-detail-chinese-state-sponsored-actions-mitigations/

https://www.cyberscoop.com/china-hacking-fbi-biden-alert-ip/

https://www.securityweek.com/cisa-details-malware-used-attacks-targeting-pulse-secure-devices

https://us-cert.cisa.gov/ncas/alerts/aa21-200b

https://us-cert.cisa.gov/ncas/current-activity/2021/07/19/us-government-releases-indictment-and-several-advisories-detailing

https://www.securityweek.com/deadringer-three-pronged-attack-chinese-military-actors-against-major-telcos

https://www.securityweek.com/china-linked-cyberespionage-operation-suggests-interest-scada-systems

https://www.securityweek.com/microsoft-says-solarwinds-serv-u-zero-day-exploited-chinese-group

https://imp0rtp3.wordpress.com/2021/08/12/tetris/

https://www.mcafee.com/blogs/enterprise/mcafee-enterprise-atr/operation-harvest-a-deep-dive-into-a-long-term-campaign/

https://theprint.in/india/chinese-state-sponsored-hackers-targeted-uidai-times-group-report-says/737673/

https://www.securityweek.com/china-intensified-attacks-major-afghan-telecom-firm-us-finalized-withdrawal

https://www.securityweek.com/macos-zero-day-exploited-deliver-malware-users-hong-kong

https://www.wired.com/story/ios-macos-hacks-hong-kong-watering-hole/

https://www.securityweek.com/report-chinese-hackers-targeted-southeast-asian-nations

https://www.securityweek.com/chinese-iranian-state-hackers-exploiting-log4j-flaw-mandiant

https://www.recordedfuture.com/chinese-state-sponsored-cyber-espionage-expansion-power-influence-southeast-asia/

https://www.securityweek.com/facebook-twitter-take-down-more-state-linked-accounts

https://www.wired.com/story/peng-shuai-censorship-china/

https://www.washingtonpost.com/national-security/china-harvests-masses-of-data-on-western-targets-documents-show/2021/12/31/3981ce9c-538e-11ec-8927-c396fa861a71_story.html

https://www.securityweek.com/media-giant-news-corp-targeted-china-linked-cyberattack

https://www.securityweek.com/symantec-super-stealthy-daxin-backdoor-linked-chinese-threat-actor

https://web.archive.org/web/20121218234344/https://blogs.technet.com/b/mmpc/archive/2012/12/06/the-quot-hidden-quot-backdoor-virtool-winnt-exforel-a.aspx

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-backdoor-espionage

https://www.cisa.gov/uscert/ncas/current-activity/2022/02/28/broadcom-software-discloses-apt-actors-deploying-daxin-malware

https://www.recordedfuture.com/inside-chinas-national-defense-mobilization-reform/

https://www.recordedfuture.com/chinas-government-is-learning-from-russias-cyberattacks-against-ukraine/

https://securityaffairs.co/wordpress/129206/apt/china-linked-apts-target-ukraine.html?utm_source=rss

https://www.securityweek.com/india-claims-it-foiled-chinese-cyberattack-disputed-border

https://therecord.media/suspected-china-backed-hackers-target-7-indian-electricity-grid-centers

https://www.recordedfuture.com/role-of-civil-society-and-the-united-front-in-chinas-evacuation-from-ukraine/

https://blogs.jpcert.or.jp/ja/2022/05/HUILoader.html

https://blog.checkpoint.com/2022/05/19/twisted-panda-check-point-research-unveils-a-chinese-apt-espionage-campaign-against-russian-state-owned-defense-institutes/

https://twitter.com/hatr/status/1529059133328175106

https://www.bbc.co.uk/news/resources/idt-8df450b3-5d6d-4ed8-bdcc-bd99137eadc3

https://www.recordedfuture.com/chinese-cybercrime-neighboring-countries

https://www.wired.com/story/china-hacking-phone-network-security-roundup/

https://blog.confiant.com/how-seaflower-%E8%97%8F%E6%B5%B7%E8%8A%B1-installs-backdoors-in-ios-android-web3-wallets-to-steal-your-seed-phrase-d25f0ccdffce

https://www.cisa.gov/uscert/ncas/alerts/aa22-158a

https://therecord.media/chinese-apt-groups-targeting-india-pakistan-and-more-with-sophos-firewall-vulnerability

https://www.buzzfeednews.com/article/emilybakerwhite/tiktok-tapes-us-user-data-china-bytedance-access

https://therecord.media/us-agencies-detail-the-digital-plumbing-used-by-chinese-state-sponsored-hackers/

https://www.cisa.gov/uscert/ncas/alerts/aa22-158a

https://www.cisa.gov/uscert/ncas/current-activity/2022/06/07/peoples-republic-china-state-sponsored-cyber-actors-exploit

https://www.securityweek.com/chinese-hackers-target-building-management-systems

https://ics-cert.kaspersky.com/publications/reports/2022/06/27/attacks-on-industrial-control-systems-using-shadowpad/

https://www.sentinelone.com/labs/targets-of-interest-russian-organizations-increasingly-under-attack-by-chinese-apts/

https://security.googleblog.com/2022/07/tag-bulletin-q2-2022.html

https://www.securityweek.com/belgium-says-chinese-apts-targeted-interior-defense-ministries

https://www.recordedfuture.com/10-years-sansha-city

https://therecord.media/taiwanese-government-sites-disrupted-by-hackers-ahead-of-pelosi-trip/

https://www.reuters.com/technology/7-11s-train-stations-cyber-attacks-plague-taiwan-over-pelosi-visit-2022-08-04/

https://www.mandiant.com/resources/pro-prc-information-operations-campaign-haienergy

https://www.cyberscoop.com/dhs-official-chinese-rules-exploit/

https://www.washingtonpost.com/politics/2022/10/17/chinese-hackers-are-scanning-state-political-party-headquarters-fbi-says/

https://www.wired.com/story/chinese-american-misinformation-midterm-elections-wechat/

https://www.forbes.com/sites/emilybaker-white/2022/10/20/tiktok-bytedance-surveillance-american-user-data/

https://www.wired.com/story/china-police-stations-security-roundup/

https://blogs.vmware.com/security/2022/10/threat-analysis-active-c2-discovery-using-protocol-emulation-part3-shadowpad.html

https://blog.google/threat-analysis-group/tag-bulletin-q3-2022/

https://www.securityweek.com/microsoft-china-flaw-disclosure-law-part-zero-day-exploit-surge

https://www.microsoft.com/en-us/security/business/microsoft-digital-defense-report-2022

https://www.microsoft.com/en-us/security/blog/2022/11/10/microsoft-threat-intelligence-presented-at-cyberwarcon-2022/ bunch of groups

https://therecord.media/fbi-director-warns-of-potential-chinese-govt-exploitation-of-tiktok/

https://www.uscc.gov/annual-report/2022-annual-report-congress

https://www.securityweek.com/microsoft-warns-boa-web-server-risks-after-hackers-target-it-power-grid-attacks

https://www.cyfirma.com/blogs/windows-internet-key-exchange-ike-remote-code-execution-vulnerability-analysis/

https://www.wired.com/story/china-zero-covid-protest-crackdown/

https://www.wired.com/story/how-chinese-protests-netizens-swamped-chinas-internet-controls/

https://www.securityweek.com/amnesty-international-canada-says-it-was-hacked-beijing

https://therecord.media/amnesty-international-breach-linked-to-chinese-government-investigation-finds/

https://theintercept.com/2022/12/30/russia-china-news-media-agreement/

https://www.securityweek.com/many-13-new-mac-malware-families-discovered-2022-linked-china

https://www.uscc.gov/annual-report/2022-annual-report-congress

https://kienmanowar.wordpress.com/2023/01/09/quicknote-another-nice-plugx-sample/

https://twitter.com/dakotaindc/status/1517519983718256640

https://www.wired.com/story/china-spy-balloon-2023/

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published