Close

U.S. and international agencies warn of China-based cyber group APT40 threat; APT40 targets public infrastructure, exploits software vulnerabilities like Log4J, and seeks user credentials

Jul 9, 2024 Press Release 2 min read

Exclusive Industry Insights

By submitting, you agree to our Privacy Policy

Share this article:

July 9, 2024 (press release) –

A joint advisory issued the week of July 8 by the Cybersecurity and Infrastructure Security Agency, National Security Agency, FBI and several international agencies warns of the threat of a state-sponsored cyber group in China. The Advanced Persistent Threat (APT) 40, also known as Kryptonite Panda, GINGHAM TYPHOON, Leviathan and Bronze Mohawk, has previously targeted organizations in the United States and other countries. APT40 is exploiting newly public vulnerabilities in widely used software such as Microsoft Exchanges, Log4J and Atlassian Confluence. The group appears to prefer exploiting public-facing infrastructure using techniques such as phishing campaigns and places a high priority on obtaining user credentials to enable a range of activities. 
  
"According to the authoring agencies, APT40 is operating on behalf of China’s Ministry of State Security," said John Riggi, AHA national advisor of cybersecurity and risk. "The report notes that this hacking group had previously been involved in the theft of medical research related to infectious diseases. This useful technical bulletin describes in detail how this group appears to prefer exploiting vulnerable, public-facing infrastructure over techniques that require user interaction, such as phishing campaigns, and places a high priority on obtaining valid credentials to enable a range of follow-on activities to enable penetration of high value networks and theft of sensitive data. Based upon this report, it is assessed that APT40 may pose a particular risk to health care organizations that have significant unpatched internet facing vulnerabilities and are engaged in sensitive medical research and innovation. Organizations fitting this risk profile should implement the report’s recommended mitigations."   
 
For more information on this or other cyber and risk issues, contact Riggi at jriggi@aha.org. For the latest cyber and risk resources and threat intelligence, visit aha.org/cybersecurity.  

* All content is copyrighted by Industry Intelligence, or the original respective author or source. You may not recirculate, redistribute or publish the analysis and presentation included in the service without Industry Intelligence's prior written consent. Please review our terms of use.

Stay Ahead of Changes

Don't Wait. Stay Informed.

The world and your industry are changing too fast. You need to know what's happening, and our Legislation Monitor can help. It's a critical resource for anyone who wants to stay ahead of regulatory and legal challenges. Then, discover the other ways that Industry Intelligence Inc. can help your business.

Cookie Preferences

This website uses cookies to enhance your browsing experience, analyze site performance, and deliver personalized content. We use a minimal cookie to remember your preferences. For detailed information about our cookie usage, please review our Privacy Policy.