An unidentified hacking group has gained access to the internal IT network of the 2021 National Games of China.
The competition, which took place in September 2021 in the city of Shaanxi, is an internal sporting event for Chinese athletes only, modeled after the rules of the Olympic Games and the event where national champions are crowned across different sporting events.
Avast said that roughly 12 days before the event’s start, unknown attackers gained access to a public server and an SQL database belonging to the event’s organizers and proceeded to install web shells so they could access systems at later points.
“After gaining access, the attackers tried to move through the network using exploits and brute-forcing services in an automated way,” Avast said in a report published on Thursday.
To achieve lateral movement, Avast said the attackers used an exploitation framework written in the Go programming language that included plugins for several known vulnerabilities.
The security firm said it learned of the incident from an incident response report that contained details about the breach its researchers found on VirusTotal, a web platform now owned by Google where users can upload and scan files for malware.
“Based on the initial information from the report and our own findings, it appears the breach was successfully resolved prior to the start of the games,” Avast added.
The Czech security firm said it was unable to determine what information the hackers stole but said that they “have reason to believe [the attackers] are either native Chinese-language speakers or show high fluency in Chinese.”
You may also enjoy reading, The largest DDoS to date, Microsoft mitigates a 3.47 Tbps DDoS attack
Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for RiSec Weekly Cybersecurity Newsletter Today
Remember, CyberSecurity Starts With You!
This post was last modified on 4 February 2022 2:15 PM
British high street chain WH Smith has recently revealed that it was hit by a…
As banks worldwide roll out Voice ID as a means of user authentication over the…
In the era of digital transformation, cybersecurity has become a major concern for businesses. When…
In today's digital age, cybersecurity threats have become a significant concern for businesses of all…
The RIG Exploit Kit is currently in the midst of its most productive phase, attempting…
One of the most transformational technologies of our time, artificial intelligence (AI), has quickly come…
Leave a Comment