Tag Archives: Cybersecurity

image_pdfimage_print

Cyber Defence Product of the Year: Freemindtronic Finalist at National Cyber Awards 2024

DataShielder Auth NFC HSM by Freemindtronic – Finalist for Cyber Defence Product of the Year 2024

PRESS RELEASE – DataShielder Auth NFC HSM Made in Andorra by Freemindtronic Finalist for Cyber Defence Product of the Year 2024!

Escaldes-Engordany, Andorra, August 5, 2024 – Freemindtronic Andorra proudly announces that its DataShielder Auth NFC HSM has been selected as a finalist for the prestigious Cyber Defence Product of the Year award at the National Cyber Awards 2024. This highly regarded event, sponsored by BAE Systems, celebrates excellence in cybersecurity and innovation.

As digital threats continue to evolve, the importance of cybersecurity cannot be overstated. Cyber attacks such as identity theft, false transfer orders, theft of sensitive data, remote and proximity industrial espionage, and the interception of sensitive information from devices pose significant risks to businesses, governments, and individuals. The National Cyber Awards, recognized for their rigorous standards, aim to promote innovation, resilience, and best practices worldwide in the fight against these ever-growing threats.

A Notable Presence at the National Cyber Awards 2024

Freemindtronic’s CEO, Jacques Gascuel, attended the awards ceremony in London, proudly representing Andorra, one of the smallest countries in the world. Freemindtronic was honored to receive the Silver Certificate as a finalist in the Innovation & Defence category. The company was also thrilled to witness Lisa Ventura MBE, founder of Cyber Security Unity, receive the Highly Commended distinction.

Freemindtronic was the only foreign company to be named a finalist in the UK’s prestigious National Cyber Awards. “We are proud to represent Andorra on the global stage,” said Jacques Gascuel, who also had the honor of gifting The Cyber Trust organizers a NFC vCard DataShielder collector, designed specifically with the logo and robot of the National Cyber Awards 2024. Photos from this moment can be found in the official gallery.

CEO’s Statement:
“We look forward to competing again next year with our upcoming 2025 innovation. I want to thank the organizers for their warm welcome and congratulate all the finalists.”

DataShielder Auth NFC HSM: Among the Top Finalists

Freemindtronic’s DataShielder Auth NFC HSM was selected as a finalist due to its advanced capabilities in safeguarding against identity theft, sensitive data breaches, and industrial espionage. Utilizing AES-256 CBC post-quantum encryption, the device ensures optimal security and operates entirely offline, without the need for servers or databases.

A Special Conversation with Industry Experts

During the event, an insightful discussion took place between Jacques Gascuel, Graham Day of Genesys, and Lisa Ventura (who received the prestigious award). They discussed PassCypher HSM PGP Free, Freemindtronic’s free password manager. Graham Day pointed out that a password manager offering such advanced and comprehensive security for free might be met with skepticism by users, who may find it hard to believe such a solution could truly be free. However, the idea of allowing donations to support its development was seen as a more acceptable approach. They also discussed the paid version of PassCypher HSM PGP, which offers fully automated services with a patented segmented encryption system, sparking conversation about potential partnerships.

Message from the Prime Minister of the United Kingdom

The Prime Minister of the United Kingdom, the Right Honorable Keir Starmer, expressed his support for the National Cyber Awards:
“The National Cyber Awards are a wonderful way to reward, celebrate, and showcase the work of those committed to keeping us safe. Please pass on my warmest congratulations to the winners who are an inspiration to everyone in the sector.”

About the National Cyber Awards

The National Cyber Awards were established in 2019 to celebrate excellence and innovation in cybersecurity. They honor exceptional achievements in both the public and private sectors. These awards highlight the continuous efforts of professionals and organizations dedicated to addressing the ever-changing challenges of cybersecurity.

Innovation and Security with DataShielder Auth NFC HSM – A Finalist for Cyber Defence Product of the Year

The DataShielder Auth NFC HSM provides advanced protection against sophisticated AI-assisted attacks, making it a leader in the fight against digital identity theft and data espionage. Compatible with a variety of communication systems (including emails, SMS, MMS, RCS, and private messaging platforms), this device ensures seamless integration into existing infrastructures while offering robust security.

Freemindtronic’s dedication to privacy and security has been recognized for a second time by the National Cyber Awards. This latest achievement builds upon the company’s previous recognition as a Highly Commended finalist in 2021. The DataShielder Auth NFC HSM remains a dual-use solution for both civilian and military applications.

For more information, visit the official National Cyber Awards 2024 gallery to see Jacques Gascuel showcasing the DataShielder NFC HSM Defense and DataShielder NFC HSM Auth products.

Notes to Editors

What are The National Cyber Awards?

The National Cyber Awards began in 2019 to celebrate excellence and innovation among those dedicated to cybersecurity. These awards highlight the exceptional achievements of professionals, companies, and educators from both the private and public sectors. Industry leaders, passionate about elevating the field of cybersecurity, envisioned these awards. They recognize and inspire commitment to tackling the ever-evolving challenges of cybersecurity.

Our mission is to identify and celebrate outstanding contributions in the field. We aim to provide a benchmark of excellence for everyone to aspire to. We envision a future where every international cybersecurity innovation is recognized and celebrated. This recognition encourages continuous improvement and the adoption of best practices worldwide. With support from our sponsors, participation in the awards remains free. Each finalist receives a complimentary ticket to the ceremony, minimizing barriers to entry and making participation accessible to all.

http://www.thenationalcyberawards.org

Contact: Future Tech Events, Fergus Bruce, info@futuretechevents.com

2024 Finalists for The National Cyber Awards in the Category “Cyber Defence Product of the Year 2024”

Candidate Summary

  • Product: DataShielder Auth NFC HSM
  • Category: Cyber Defence Product of the Year 2024
  • Name: Jacques Gascuel
  • Company: Freemindtronic
  • Email: contact@freemindtronic.com
  • Company Bio: Freemindtronic specializes in designing, publishing, and manufacturing counter-espionage solutions. Our latest innovation, the DataShielder Auth NFC HSM, serves as a dual-use counter-espionage solution for both civilian and military applications. We first presented this solution to the public on June 17, 2024, at Eurosatory 2024. It actively combats identity theft, espionage, and access to sensitive and classified data and messages through AES 256 CBC post-quantum encryption. Furthermore, it operates offline, without servers, without databases, and without needing users to identify themselves or change their habits of storing sensitive data, messaging services, or communication protocols, all while avoiding infrastructure costs.

Additional Product Features

  • Compatibility with Various Communication Systems: DataShielder Auth NFC HSM supports multiple communication systems, including emails, chats, webmails, SMS, MMS, RCS, and both public and private instant messaging services. This universal compatibility allows seamless integration into existing communication environments, ensuring continuous protection without significant infrastructure changes.
  • Protection Against AI-Assisted Attacks: DataShielder Auth NFC HSM provides advanced protection against sophisticated AI-assisted attacks. With robust encryption and strong authentication, the product eliminates risks posed by identity theft attempts using advanced social engineering techniques, ensuring enhanced security for users.
  • Key Management Methods: The product utilizes hardware security modules with NFC technology to securely create and manage keys. The DataShielder devices securely store the randomly generated encryption keys. The system operates without servers or databases, offering end-to-end anonymity and significantly reducing potential points of vulnerability.

DataShielder NFC HSM products are exclusively available in France through AMG Pro and internationally through Fullsecure Andorra.

We thank all the members of the jury for their interest in our latest revolutionary product, the DataShielder NFC HSM.

Judges – The National Cyber Awards

  • Mary Haigh: CISO, BAE Systems
  • Rachael Muldoon: Barrister, Maitland Chambers
  • Shariff Gardner: Head of Defence, Military and Law Enforcement, UK, Ireland & Nordics, SANS Institute
  • Damon Hayes: Regional Commander, National Crime Agency
  • Miriam Howe: Head of International Consulting, BAE Systems Digital Intelligence
  • Myles Stacey OBE: Special Adviser to the Prime Minister, 10 Downing Street
  • Daniel Patefield: Head of Programme, Cyber & National Security, techUK
  • Sir Dermot Turing: Trustee, Bletchley Park Trust
  • Nicola Whiting MBE: Chair of Judges
  • Oz Alashe MBE: CEO & Founder, CybSafe
  • Professor Liz Bacon: Principal & Vice-Chancellor, Abertay University
  • Richard Beck: Director of Cyber, QA
  • Martin Borret: Technical Director, IBM Security
  • Bronwyn Boyle: CISO, PPRO
  • Charlotte Clayson: Partner, Trowers & Hamlins LLP
  • Pete Cooper: Founder, Aerospace Village
  • Professor Danny Dresner: Professor of Cyber Security, University of Manchester
  • Ian Dyson QPM DL: City of London Police
  • Mike Fell OBE: Director of Cyber, NHS England
  • Tukeer Hussain: Strategy Manager, Department for Culture, Media & Sport
  • Dr Bob Nowill: Chair, Cyber Security Challenge
  • Chris Parker MBE: Director, Government, Fortinet (Cybersecurity)
  • Dr Emma Philpott MBE: CEO, IASME Consortium Ltd
  • Peter Stuart Smith: Author
  • Rajinder Tumber MBE: Security Consultancy Team Lead, Sky
  • Saba Ahmed: Managing Director, Accenture Security
  • Charles White: Director, The Cyber Scheme
  • Professor Lisa Short: Areta Business Performance / XTCC
  • Emma Wright: Partner, Harbottle & Lewis LLP
  • Dr Budgie Dhanda MBE: Managing Consultant, PA Consulting
  • Jacqui Garrad: Museum Director, The National Museum of Computing
  • Dr Vasileios Karagiannopoulos: Co-Director of Centre for Cybercrime and Economic Crime, University of Portsmouth
  • Debbie Tunstall: Account Director, Immersive Labs
  • Sarah Montague: HMRC

Explore our additional accolades, including the Cyber Defence Product of the Year finalist recognition, alongside our trophies and the silver and gold medals we’ve earned over the past decade. 🏆🌟👇

NEWS PROVIDED BY
The National Cyber ​​Awards 2024
August 2024

Other languages available: French and Catalan. [Click here for French] [Click here for Catalan]

SHARE THIS ARTICLE

Leidos Holdings Data Breach: A Significant Threat to National Security

Multiple computer screens displaying data breach alerts in a dark room, with the Pentagon in the background.

Leidos Data Breach: National Security Risk

Discover how the Leidos Holdings data breach exposed critical vulnerabilities in U.S. government agencies, the technical failures that led to it, and how DataShielder’s advanced encryption solutions could have prevented this major security incident.

2024 Cyberculture Legal information

ePrivacy Regulation: Transforming Messaging Privacy in 2025

2024 Cyberculture

Electronic Warfare in Military Intelligence

2024 Articles Cyberculture Legal information

ANSSI Cryptography Authorization: Complete Declaration Guide

2024 Articles Cyberculture

EAN Code Andorra: Why It Shares Spain’s 84 Code

Stay informed with our posts dedicated to Digital Security to track its evolution through our regularly updated topics.

Discover our comprehensive article on the Leidos Holdings data breach, authored by Jacques Gascuel, a pioneer in cybersecurity solutions. Dive into the extensive measures DataShielder is implementing to safeguard your data. Stay informed and secure by subscribing to our regular updates.

A Major Intrusion Unveiled

In July 2024, the Leidos Holdings data breach came to light, revealing sensitive internal documents on a cybercriminal forum. These documents exposed critical vulnerabilities within the IT infrastructure of several U.S. government agencies, including the Pentagon, Homeland Security, and NASA. The details of the breach remain unclear, but initial reports suggest significant national security implications.

Chronology of the Leidos Holdings Data Breach

April 2022: Initial Breach

Steele Compliance Solutions, a subsidiary of Diligent Corp. acquired by Leidos in 2021, suffered a data breach in April 2022. This attack compromised sensitive information hosted on Diligent’s systems, affecting several clients, including Leidos Holdings.

November 2022: Notification and Response

In November 2022, Diligent Corp. informed Leidos and other affected clients of the breach. Immediate corrective actions were taken, but the extent of the data compromise was still under evaluation.

June 2023: Legal Disclosure

A legal filing in Massachusetts in June 2023 revealed that Leidos used Diligent’s system to host information collected during internal investigations. This filing indicated that the compromised data included sensitive internal documents from Leidos.

July 2024: Public Disclosure

In July 2024, hackers disclosed Leidos’ internal documents on a cybercrime forum. These documents exposed critical vulnerabilities in the IT infrastructure of several U.S. government agencies.

Historical and Strategic Context of Leidos Holdings Data Breach

The Role and Importance of Leidos Holdings

Leidos Holdings, formerly known as Science Applications International Corporation (SAIC), is a cornerstone in the field of defense and national security technology. Founded in 1969, the company engages in critical projects for agencies such as the Pentagon, NASA, and Homeland Security. Their expertise spans information systems, artificial intelligence, and cybersecurity solutions.

Technical Analysis of Vulnerabilities Exposed in the Leidos Holdings Data Breach

Details of the Vulnerabilities

The leaked documents revealed several critical vulnerabilities in the encryption protocols used by government agencies. Specifically, cybercriminals exploited weaknesses in both symmetric and asymmetric encryption protocols. These vulnerabilities included:

  • Weakness in Symmetric Encryption: The symmetric encryption keys used were sometimes too short or reused, making the data vulnerable to brute force attacks. Once these keys are compromised, all data encrypted with them becomes accessible to attackers.
  • Problems in Key Management: Private keys used for asymmetric encryption were not securely stored, allowing attackers to access and decrypt data. Additionally, outdated or misconfigured key management protocols enabled attackers to intercept keys during transmission.
  • Lack of Protocol Updates: The encryption protocols in use were not regularly updated, leaving known vulnerabilities exploitable by attackers.

Solutions from DataShielder to Prevent Similar Incidents

Advanced Encryption with DataShielder

Using solutions like DataShielder NFC HSM and DataShielder HSM PGP provides enhanced protection by offering advanced encryption upfront, with keys secured in NFC HSM modules or through multi-support key segmentation. This approach eliminates all risks of key compromise. Even if the primary encryption system is breached, the data remains encrypted.

  • Addressing Weakness in Symmetric Encryption: DataShielder employs advanced encryption algorithms such as AES-256 CBC and AES-256 CBC PGP, which are considered post-quantum, thus providing robust protection against brute force attacks.
  • Solving Key Management Issues: DataShielder stores keys securely in NFC HSM modules or across multiple supports, making key compromise extremely difficult.
  • Ensuring Security Despite Protocol Updates: DataShielder does not rely on existing encryption protocols, as data and messages are encrypted before using potentially compromised protocols. This ensures that data remains encrypted even if protocols are not regularly updated.

In this specific case, if DataShielder solutions had been employed, the cybercriminals would have only stolen encrypted data. DataShielder thus ensures robust key management, essential for protecting sensitive and classified data.

Counter-Espionage Solutions by DataShielder

DataShielder NFC HSM and DataShielder HSM PGP also serve as effective counter-espionage solutions. They prevent unauthorized access and ensure that sensitive data remains encrypted, even if compromised. These advanced encryption methods protect against espionage activities, providing an additional layer of security for classified information.

Impact and Responses to the Leidos Holdings Data Breach

Government Agency Responses

In response to the breach, the Department of Defense announced reinforced security protocols and close collaboration with Leidos to identify and rectify the exposed vulnerabilities. NASA also issued a statement indicating that it is currently reviewing its security systems to prevent future compromises.

Recommendations for Organizations

Enhancing Security Measures

To prevent similar breaches, organizations should adopt a multi-layered security approach, including advanced firewalls, intrusion detection systems, and continuous network monitoring. It is also crucial to train employees on best cybersecurity practices. Implementing solutions like DataShielder NFC HSM and DataShielder HSM PGP can provide additional protection by securing encryption keys and ensuring that data remains encrypted even if the primary system is compromised.

Source of the Leak

The internal documents of Leidos were first published on the cybercrime forum BreachForums. Known for hosting and distributing stolen data, this forum was the initial platform for the public release of these sensitive documents. Despite an FBI seizure in May 2024, the forum quickly resumed operations under the management of ShinyHunters, a former administrator​ (Hackread)​​ (The Record from Recorded Future)​.

Conclusion

The Leidos Holdings data breach raises critical questions about the security of IT infrastructures within U.S. government agencies. Ongoing investigations will determine the extent of the damage and the necessary measures to enhance the security of sensitive data. Updates on this issue will be published as new information becomes available.

For more details on this incident, please refer to the following sources:

These sources provide a detailed overview of the breach and the corrective measures implemented to contain the incident.

RockYou2024: 10 Billion Reasons to Use Free PassCypher

RockYou2024 data breach with millions of passwords streaming on a dark screen, foreground displaying advanced cybersecurity measures and protective shields.

RockYou2024 Exposed: Why You Need PassCypher Now

RockYou2024 has exposed 10 billion passwords, revealing the urgent need for robust security. PassCypher, a free password manager, offers the ultimate protection to keep your data safe.

2024 Cyberculture Legal information

ePrivacy Regulation: Transforming Messaging Privacy in 2025

2024 Cyberculture

Electronic Warfare in Military Intelligence

2024 Articles Cyberculture Legal information

ANSSI Cryptography Authorization: Complete Declaration Guide

2024 Articles Cyberculture

EAN Code Andorra: Why It Shares Spain’s 84 Code

Stay informed with our posts dedicated to Cyberculture to track its evolution through our regularly updated topics.

Discover our comprehensive article about the RockYou2024 data leak, authored by Jacques Gascuel, a pioneer in cybersecurity solutions. Learn about the extensive measures PassCypher is taking to protect your data. Stay informed and secure by subscribing to our regular updates.

RockYou2024: A Cybersecurity Earthquake

The RockYou2024 data leak has shaken the very foundations of global cybersecurity. This unprecedented leak, revealing nearly 10 billion unique passwords, highlights the fragility of computer security systems and the ease with which personal data can be compromised. The story of RockYou began in 2009 when an initial leak exposed the passwords of millions of social network users. Since then, the snowball effect has continued, incorporating data from more recent leaks. Between 2021 and 2024, an additional 1.5 billion new passwords joined the database.

The Scope of the Leak

Hackers have disclosed the passwords in RockYou2024 on specialized forums, which represents a major risk of cyberattacks. Cybercriminals can exploit this information to conduct brute force attacks, access personal and professional accounts, and perpetrate fraud.

The Online Community’s Response

Services like “Have I Been Pwned” quickly integrated RockYou2024 data, enabling users to check if hackers compromised their credentials. This integration allowed users to take proactive measures to secure affected accounts.

The Importance of Password Security

The RockYou2024 leak underscores the vital importance of creating strong, unique, and complex passwords. Security experts recommend passwords of at least 12 characters, combining letters, numbers, and symbols to maximize entropy and reduce decryption risks.

PassCypher: The Answer to RockYou2024

PassCypher HSM PGP Free

PassCypher HSM PGP Free offers an autonomous password management solution that requires no server, no database, no identification, and no master password. It provides end-to-end protection with AES 256 CBC PGP encryption and is available for free in 13 languages, making security accessible to everyone.

Anti-Phishing and Typosquatting Protection

PassCypher HSM PGP Free incorporates advanced anti-phishing features, typosquatting protection, and man-in-the-browser (BITB) attack protection. It ensures secure navigation and real-time URL verification. Additionally, it performs real-time automatic checks of compromised passwords via Pwned, offering proactive security against the use of already compromised passwords.

PassCypher HSM PGP with Segmented Key

For those seeking even more advanced and fully automated security, PassCypher HSM PGP with Segmented Key offers patented granular encryption, providing post-quantum security to counter future threats. With a one-click auto-connection system that takes less than a second without any further intervention on your part, this solution also benefits from anti-phishing systems and real-time corruption control of passwords and identifiers.

PassCypher NFC HSM

PassCypher NFC HSM acts as a contactless hardware password manager that works with Android NFC smartphones. It allows contactless auto-connection via an NFC HSM and offers a gateway between PassCypher NFC HSM and PassCypher HSM PGP for auto-connection on a computer. Additionally, PassCypher NFC HSM manages 2FA TOTP secret keys, optimizing online account security even if passwords and identifiers are compromised.

Intelligent Features of PassCypher HSM PGP

PassCypher HSM PGP includes an intelligent system that facilitates auto-filling when changing passwords. By generating a new password beforehand, users can replace the old one with a single click. Moreover, a corruption warning alerts users if hackers compromise their credentials, making the password replacement process safer and easier.

Paid Solutions from PassCypher

PassCypher’s paid solutions, such as PassCypher HSM PGP with PassCypher Engine license, offer additional benefits like storage path management for keys and data. They also include NFC HSM button selection for containers on NFC HSM via a paired Android phone and the ability to download licenses for external storage and restoration. These solutions are ideal for both civilian and military use, offering serverless and database-free security for optimal protection against phishing threats and cyberattacks.

Detailed Technical Analysis

Credential Stuffing

Attackers use credential stuffing to take advantage of previously compromised username and password combinations. They automate the process of attempting these credentials on various websites and services. Since many users reuse passwords across different platforms, this method can be alarmingly effective. By leveraging bots and scripts, hackers can test thousands of credentials in a short time, gaining unauthorized access to numerous accounts.

To counteract credential stuffing, it’s crucial to use complex and unique passwords for each account. A complex password typically includes a mix of upper and lower case letters, numbers, and special characters. This increases the entropy, or randomness, making it much harder for automated attacks to succeed.

Historical Context of Data Breaches Leading to RockYou2024

  • 2009: RockYou – The original breach exposed millions of social network users’ passwords.
  • 2012: LinkedIn – Over 6 million passwords leaked online, exposing a major social networking site’s security vulnerabilities.
  • 2013: Adobe – This breach affected approximately 38 million users, compromising a significant amount of user data and passwords.
  • 2016: MySpace – Around 360 million user accounts were compromised in this massive data breach.
  • 2021: RockYou2021 – The largest compilation of passwords to date, containing over 8.4 billion entries, built from multiple previous data leaks.

These breaches cumulatively contributed to the vast dataset found in RockYou2024. Each incident added more credentials to the pool of compromised data, illustrating the evolving and persistent threat of cybersecurity breaches.

Conclusion

PassCypher HSM PGP Free provides a robust and comprehensive response to the increased risks posed by data leaks like RockYou2024. With its advanced features and free availability, it represents a logical and pertinent solution for strengthening the security of our digital lives. There is no financial excuse for not securing our passwords.

Russian Cyberattack Microsoft: An Unprecedented Threat

Cybersecurity theme with shield, padlock, and computer screen displaying warning signs, highlighting the Russian cyberattack on Microsoft.

Russian Cyberattack on Microsoft: Unprecedented Threat Uncovered

The recent Russian cyberattack on Microsoft, orchestrated by the notorious group Midnight Blizzard, has revealed a far more severe threat than initially anticipated. Learn how Microsoft is countering this sophisticated attack and what implications it holds for global cybersecurity.

2024 Cyberculture Legal information

ePrivacy Regulation: Transforming Messaging Privacy in 2025

2024 Cyberculture

Electronic Warfare in Military Intelligence

2024 Articles Cyberculture Legal information

ANSSI Cryptography Authorization: Complete Declaration Guide

2024 Articles Cyberculture

EAN Code Andorra: Why It Shares Spain’s 84 Code

Stay informed with our posts dedicated to Cyberculture to track its evolution through our regularly updated topics.

Discover our new Cyberculture article about the Russian Cyberattack on Microsoft, authored by Jacques Gascuel, a pioneer in counterintelligence and expert in contactless, serverless, databaseless, loginless, and wireless security solutions. Stay informed and safe by subscribing to our regular updates.

Microsoft Admits Russian Cyberattack Was Worse Than Expected

Microsoft recently confirmed that the cyberattack by the Russian group Midnight Blizzard was far more severe than initially reported. Midnight Blizzard, also known as NOBELIUM, APT29, and Cozy Bear, is a state-sponsored actor backed by Russia. This group primarily targets governments, NGOs, and IT service providers in the United States and Europe.

Background and Technical Details

Active since at least 2018, Midnight Blizzard has been involved in notorious attacks such as the SolarWinds campaign. This group employs various sophisticated techniques, including password spray attacks and the exploitation of malicious OAuth applications. These methods allow attackers to penetrate systems without raising suspicion​.

Immediate Response from Microsoft

On January 12, 2024, Microsoft detected unauthorized access to its internal systems. The security team immediately activated a response process to investigate and mitigate the attack. Midnight Blizzard compromised a legacy non-production test account, gaining access to several internal email accounts, including those of senior executives and critical teams like cybersecurity and legal​.

Impact of Compromised Emails from the Russian Cyberattack

Midnight Blizzard managed to exfiltrate internal Microsoft emails, including sensitive information shared between the company and its clients. The attackers used this information to attempt access to other systems and increased the volume of password spray attacks by tenfold in February 2024. This led to an increased risk of compromise for Microsoft’s clients​.

Statistical Consequences of the Russian Cyberattack on Microsoft

  • Increase in Attacks: In February 2024, the volume of password spray attacks was ten times higher than in January 2024.
  • Multiple Targets: The compromised emails allowed Midnight Blizzard to target not only Microsoft but also its clients, thereby increasing the risk of compromise across various organizations.
  • Access to Internal Repositories: The attackers were able to access some source code repositories and internal systems, although no customer-facing systems were compromised​.

Advanced Encryption and Security Solutions

To protect against such sophisticated threats, it is crucial to adopt robust encryption solutions. Technologies like DataShielder NFC HSM, DataShielder HSM PGP, and DataShielder Auth NFC HSM offer advanced means to encrypt all types of messaging, including Microsoft’s emails. These solutions ensure the security of sensitive communications by keeping emails and attachments always encrypted. They manage and use encryption keys via NFC HSM or HSM PGP, ensuring that emails are no longer dependent on the security of the messaging services.

Imagine if the victims of the Midnight Blizzard attack had used DataShielder. In this scenario, even if their inboxes were compromised, the encrypted emails would have remained unreadable to the attackers. This additional protection could have significantly reduced the risk of sensitive information disclosure. Statistically, about 90% of data breaches are due to unencrypted or poorly protected emails. If DataShielder had been used, this percentage could have been significantly reduced, offering a robust defense against such intrusions.

Furthermore, DataShielder ensures centralized and secure key management, eliminating the risks associated with decentralized management. The solution easily integrates with existing systems, minimizing operational disruptions during implementation.

Global Reactions and Security Measures

This attack highlights the ongoing risks posed by well-funded state actors. In response, Microsoft launched the Secure Future Initiative (SFI). This initiative aims to strengthen the security of legacy systems and improve internal processes to defend against such cyber threats. The company has also adopted a transparent approach, quickly sharing details of the attack and closely collaborating with government agencies to mitigate risks​.

Best Practices in Cybersecurity to Prevent Russian Cyberattacks

To protect against these threats, companies must adopt robust security measures. Multi-factor authentication and continuous system monitoring are crucial. Additionally, implementing regular security updates is essential. The CISA emergency directive ED 24-02 requires affected federal agencies to analyze the content of exfiltrated emails, reset compromised credentials, and secure authentication tools for privileged Azure accounts​ (CISA)​.

Comparison with Other Cyberattacks

This attack is reminiscent of other major incidents, such as those against SolarWinds and Colonial Pipeline. These attacks demonstrate the evolving techniques of attackers and the importance of maintaining constant vigilance. Companies must be ready to respond quickly and communicate transparently with stakeholders to minimize damage and restore trust​.

Conclusion on the Russian Cyberattack on Microsoft

The Midnight Blizzard cyberattack on Microsoft serves as a poignant reminder of the complex challenges posed by state actors. It also underscores the critical importance of cybersecurity in today’s digital world. To learn more about this attack and its implications, stay informed with continuous updates from Microsoft and recommendations from security experts​.​​

Further Reading: For a more detailed analysis of this incident and its wider implications, read our previous article on the Midnight Blizzard cyberattack against Microsoft and HPE, authored by Jacques Gascuel. Read the full article here.

 

Dropbox Security Breach 2024: Phishing, Exploited Vulnerabilities

A realistic depiction of the 2024 Dropbox security breach, featuring a cracked Dropbox logo with compromised data such as emails, user credentials, and security tokens spilling out. The background includes red flashing alerts and warning symbols, highlighting the seriousness of the breach.

Delving into the 2░0░2░4░Dropbox Security Breach: A Chronicle of Vulnerabilities, Exfiltrated Data

In 2024, a shadow fell over cloud storage security. The Dropbox breach exposed a shocking vulnerability, leaving user data at risk. This deep dive explores the attack, the data compromised, and why encryption remains your ultimate defense. Dive in and learn how to fortify your digital assets.

2024 Digital Security

Why Encrypt SMS? FBI and CISA Recommendations

2024 Digital Security

French Minister Phone Hack: Jean-Noël Barrot’s G7 Breach

2024 Digital Security

Cyberattack Exploits Backdoors: What You Need to Know

2024 Digital Security

Google Sheets Malware: The Voldemort Threat

2024 Articles Digital Security News

Russian Espionage Hacking Tools Revealed

2024 Digital Security Spying Technical News

Side-Channel Attacks via HDMI and AI: An Emerging Threat

Dropbox Security Breach. Stay updated with our latest insights.

Europol

Dropbox Security Breach: Password Managers and Encryption as Defense By Jacques Gascuel, this article examines the crucial role password managers and encryption play in mitigating the risks of cyberattacks like the Dropbox Security Breach

Phishing Tactics: The Bait and Switch in the Aftermath of the Dropbox Security Breach

The 2024 Dropbox Security Breach stands as a stark reminder of the ever-evolving cyberthreat landscape and the urgent need for robust security measures. In this comprehensive article, we’ll unravel the intricate details of this breach, examining the tactics employed by attackers, the vast amount of sensitive data compromised, and the far-reaching consequences for affected users. We’ll also delve into the underlying security vulnerabilities exploited and discuss essential measures to prevent similar incidents in the future. Finally, we’ll explore the crucial role of advanced encryption solutions, such as DataShielder and PassCypher, in safeguarding sensitive data stored in the cloud. Through this in-depth analysis, you’ll gain a clear understanding of the Dropbox breach, its impact, and the proactive steps you can take to enhance your own cybersecurity posture.

Crafting Convincing Emails

Attackers meticulously crafted phishing emails, often disguised as notifications or security alerts, to deceive employees.

  • Crafting Convincing Emails: Attackers meticulously crafted phishing emails, often disguised as notifications or security alerts, to deceive employees.
  • Exploiting Human Trust: By leveraging the trust employees had in Dropbox, attackers successfully persuaded them to divulge sensitive information.
  • MFA Circumvention: The compromise of MFA codes highlights the need for additional layers of security beyond passwords.
Diagram illustrating the stages of the 2024 Dropbox Security Breach attack flow.
This diagram depicts the stages of the 2024 Dropbox Security Breach, from phishing emails to data exfiltration and its aftermath.

Dropbox Security Breach Attack Flow: Unraveling the Steps of the Cyberattack

  • Phishing Emails: Attackers send out phishing emails to Dropbox employees, mimicking legitimate communications.
  • Credential Harvesting: Employees fall victim to phishing tactics and reveal their credentials, including MFA codes.
  • Unauthorized Access: Attackers gain unauthorized access to Dropbox Sign infrastructure using compromised credentials.
  • Exploiting Automated Tools: Attackers exploit automated system configuration tools to manipulate accounts and escalate privileges.
  • Data Exfiltration: Attackers extract a vast amount of sensitive data, including emails, usernames, phone numbers, hashed passwords, API keys, OAuth tokens, and MFA data.

Exploited Vulnerabilities: A Technical Analysis

The attackers behind the Dropbox breach exploited a combination of vulnerabilities to gain unauthorized access and exfiltrate sensitive data.

Specific CVEs Exploited

  • CVE-2019-12171: This vulnerability allowed attackers to store credentials in cleartext in memory, posing a significant security risk.
  • CVE-2022-4768: This critical vulnerability in Dropbox Merou affected the add_public_key function, leading to injection attacks.
  • Automated System Configuration Tools: The exploitation of these tools highlights the need for robust access controls and security measures.

Exfiltrated Data: The Scope of the Breach

The sheer volume of data compromised in the Dropbox breach is staggering, raising serious concerns about the potential impact on affected users.

Types of Data Exposed

  • Exposed Emails: Attackers now possess email addresses, potentially enabling them to launch targeted phishing attacks or engage in email scams.
  • Vulnerable Usernames: Usernames, often coupled with leaked passwords or other personal information, could be used to gain unauthorized access to other online accounts.
  • Misused Phone Numbers: Exposed phone numbers could be used for unwanted calls, text messages, or even attempts to reset passwords or gain access to other accounts.
  • Hashed Passwords: A Target for Cracking: While not directly readable, hashed passwords could be subjected to brute-force attacks or other cracking techniques to recover the original passwords.
  • Compromised Authentication Tokens: API keys and OAuth tokens, used for app authentication, could enable attackers to impersonate users and access their Dropbox accounts or other connected services.

The Dropbox Breach Fallout: Unraveling the Impact and Consequences

The ramifications of the Dropbox breach extend far beyond the compromised data itself. The incident has had a profound impact on both affected users and Dropbox as a company.

Consequences of the Breach

  • User Privacy Concerns: The exposure of personal information has left users feeling vulnerable and at risk of identity theft, phishing attacks, and other cyber threats.
  • Reputational Damage: Dropbox’s reputation as a secure cloud storage provider has taken a significant hit, potentially affecting user trust and future business prospects.
  • Financial Costs: Dropbox has incurred substantial expenses in investigating the breach, notifying affected users, and implementing additional security measures.

Lessons Learned: Preventing Future Breaches and Strengthening Security

In the aftermath of the Dropbox breach, it’s crucial to identify key takeaways and implement preventive measures to safeguard against future incidents.

Essential Security Practices

  • Secure Service Accounts: Implement strong passwords for service accounts and enforce strict access controls, adhering to the principle of least privilege. Consider using Privileged Access Management (PAM) solutions to manage and monitor service account activity.
  • Regular Penetration Testing: Conduct regular penetration tests (pen tests) to identify and remediate vulnerabilities in systems and networks before they can be exploited by attackers. Engage qualified security professionals to simulate real-world attack scenarios.
  • Continuous Monitoring and Incident Response: Establish a robust incident response plan to effectively address security breaches. This plan should include procedures for identifying, containing, and remediating incidents.
  • Patch Management: Prioritize timely patching of software and systems with the latest security updates. Implement a comprehensive patch management strategy to ensure the prompt deployment of critical security updates.

Beyond the Breach: Enhancing Proactive Defense with Advanced Encryption

While robust security practices are essential for preventing breaches, additional layers of protection can further safeguard data. Advanced encryption solutions play a pivotal role in this regard. Here, we’ll delve into two such solutions – DataShielder HSM PGP and NFC HSM, and PassCypher HSM PGP and NFC HSM – and explore how they address the vulnerabilities exploited in the 2024 Dropbox breach.

DataShielder HSM PGP and NFC HSM

DataShielder HSM PGP and NFC HSM provide client-side encryption for data stored in the cloud. By encrypting data at rest and in transit (as depicted in the following diagram [Insert DataShielder Diagram Here]), DataShielder ensures that even if an attacker gains access to cloud storage, the data remains inaccessible. This robust protection is achieved through:

  • Client-Side Encryption: Data is encrypted on the user’s device before being uploaded to the cloud.
  • Hardware Security Module (HSM) or NFC HSM: Encryption keys are stored within a secure HSM or NFC HSM, offering physical separation and robust protection against unauthorized access.
  • Offsite Key Management: Encryption keys are never stored on the cloud or user devices, further minimizing the risk of compromise (as illustrated in the diagram).
  • Post-Quantum Encryption: Additionally, DataShielder incorporates post-quantum encryption algorithms to safeguard against future advancements in code-breaking techniques.

Diagram showing DataShielder HSM PGP and DataShielder NFC HSM encryption process for Dropbox security breach protection.

DataShielder HSM PGP and NFC HSM: Ensuring Dropbox security breach protection with AES-256 encryption and offsite key management

PassCypher HSM PGP and NFC HSM

PassCypher HSM PGP and NFC HSM go beyond traditional password management, offering a comprehensive security suite that directly addresses the vulnerabilities exploited in the 2024 Dropbox breach. Here’s how PassCypher strengthens your defenses:

  • Multi-Factor Authentication (MFA) with Hardware Security: PassCypher NFC HSM offers additional protection for logins by securely managing Time-based One-Time Passwords (TOTP) and HOTP keys. Users can scan a QR code to automatically store the encrypted TOTP secret key within the NFC HSM, adding a layer of hardware-based authentication beyond passwords.
  • Real-Time Password Breach Monitoring: PassCypher HSM PGP integrates with Have I Been Pwned (HIBP), a constantly updated database of compromised passwords. This real-time monitoring allows users to be instantly notified if their passwords appear in any known breaches.
  • Phishing Prevention: In addition to the URL sandbox system and protection against typosquatting and BITB attacks mentioned earlier, PassCypher’s comprehensive approach empowers users to identify and avoid malicious attempts (as detailed in the diagram).
  • Client-Side Encryption: PassCypher utilizes client-side encryption to ensure data remains protected even if attackers manage to exfiltrate it (as shown in the diagram).

 

Diagram illustrating PassCypher HSM PGP and PassCypher NFC HSM, focusing on Dropbox security breach protection

By combining these features, PassCypher HSM PGP and NFC HSM provide a robust defense against the social engineering tactics and credential theft exploited in the Dropbox breach.

Statistics of the 2024 Dropbox Security Breach

While verifying the exact number of users affected by data breaches can be challenging, security experts estimate that the Dropbox breach could have impacted a substantial number of users. Some reports suggest that the breach may have affected up to 26 billion records, making it one of the largest data breaches in history. However, it is crucial to note that this figure is unconfirmed and may not reflect the actual number of individuals impacted.

Key Takeaways for Enhanced Cybersecurity

  • Uncertain Numbers: The exact number of affected users remains unclear, highlighting the challenges in verifying breach statistics.
  • Potential for Massive Impact: The estimated 26 billion records underscore the potential scale of the breach and its far-reaching consequences.
  • Importance of Reliable Sources: Relying on reputable sources for breach information is crucial to ensure accurate and up-to-date data.

Conclusion: A Call for Vigilance and Enhanced Security in the Wake of the Dropbox Security Breach

The 2024 Dropbox security breach serves as a stark reminder of the ever-evolving cyberthreat landscape and the urgent need for vigilant security practices. Organizations must prioritize robust security measures, including strong access controls, regular vulnerability assessments, and timely patching. Additionally, advanced encryption solutions, such as DataShielder HSM PGP and NFC HSM and PassCypher HSM PGP and NFC HSM, can provide an extra layer of protection for sensitive data.

Key Takeaways for Enhanced Cybersecurity

  • Collective Responsibility: Cybersecurity is a shared responsibility, requiring collaboration between organizations and individuals.
  • Continuous Learning and Awareness: Staying informed about emerging threats and adopting best practices are essential for effective cybersecurity.
  • Protecting Sensitive Data: Prioritizing data protection through robust security measures and advanced encryption is paramount.

The 2024 Dropbox security breach serves as a cautionary tale, highlighting the vulnerabilities that can exist even in large, established organizations. By learning from this incident and implementing the recommendations discussed, we can collectively strengthen our cybersecurity posture and protect our valuable data from the ever-evolving threat landscape.

Andorra National Cyberattack Simulation: A Global First in Cyber Defense

A modern cybersecurity control center with a diverse team monitoring national cyber threats during the Andorra National Cyberattack Simulation.

Andorra Leads with a Groundbreaking National Cyberattack Simulation

In an era of constantly evolving cyber threats, the Andorra National Cyberattack Simulation actively demonstrates proactive defense and innovative cybersecurity strategies. With the launch of this landmark simulation imminent, Andorra is set to redefine the standards for digital safety and preparedness.

2024 Cyberculture Legal information

ePrivacy Regulation: Transforming Messaging Privacy in 2025

2024 Cyberculture

Electronic Warfare in Military Intelligence

2024 Articles Cyberculture Legal information

ANSSI Cryptography Authorization: Complete Declaration Guide

2024 Articles Cyberculture

EAN Code Andorra: Why It Shares Spain’s 84 Code

Stay informed with our posts dedicated to Cyberculture to track its evolution through our regularly updated topics.

Discover our new Cyberculture article about a country’s independent simulation of cyberattacks, a national event scheduled for April 16, 2024 in Andorra. Authored by Jacques Gascuel, a pioneer in contactless, serverless, databaseless and wireless security solutions, this article offers a unique insight into this revolutionary initiative. Stay informed and safe by subscribing to our regular updates.

Andorra Cybersecurity Simulation: A Vanguard of Digital Defense

Andorra-la-Vieille, April 15, 2024 – Andorra is poised to make history with the first-ever Andorra National Cyberattack Simulation, led by the Agència Nacional de Ciberseguretat d’Andorra. On April 16, in collaboration with Andorra Digital and the Secretariat of State for Digital Transformation and Telecommunications, the country will conduct a comprehensive cyber exercise. This trailblazing initiative is set to redefine global cybersecurity standards.

Andorra National Cyberattack Simulation: An Unprecedented Scale

The Andorra National Cyberattack Simulation will launch a series of attacks on critical national infrastructure, testing Andorra’s resilience and readiness against escalating digital threats. With participants from both public and private sectors, this exercise is unparalleled in its scope and reach.

A Pioneering Approach in the Andorra National Cyberattack Simulation

Unlike the USA and Israel, Andorra emphasizes inclusive national coordination in its simulations. This focus significantly shifts cybersecurity practices. It positions Andorra as a pioneer, integrating comprehensive national efforts into its cybersecurity framework. This strategic move enhances its resilience and sets a new global standard.

International Context of the Andorra National Cyberattack Simulation

Comparing this initiative with global counterparts underscores Andorra’s adoption and adaptation of best practices. This approach highlights the need for tailored cybersecurity strategies to effectively counter specific national security challenges.

Expert Analysis on Cyber Resilience

Cybersecurity experts agree that simulations like the Andorra National Cyberattack Simulation are critical for testing and enhancing national resilience. They stress that such exercises are crucial not only for identifying vulnerabilities but also for heightening national vigilance.

Anticipated Outcomes of the Simulation

This simulation is vital for bolstering the country’s cyber resilience. It will pinpoint vulnerabilities, refine incident response protocols, and strengthen the digital security culture across Andorra.

Post-Exercise Follow-Up

Planners have scheduled a detailed analysis post-exercise to scrutinize the outcomes and lessons learned from the national cyberattack simulation. This evaluation will be crucial in assessing the simulation’s effectiveness and in adjusting future strategies based on the findings, thus providing a comprehensive perspective on its impact and efficiency.

Direct Insights on National Cyber Resilience

Freemindtronic Andorra, designer, developer and manufacturer of innovative dual-use counter-espionage and cyber-resilience solutions, welcomes this exceptional initiative. As a pioneer in the field of contactless encryption of communications systems, Freemindtronic underlines the importance and relevance of this exercise for national security and the advancement of cutting-edge technologies in the fight against cyber threats.

Jacques Gascuel, CEO Freemindtronic, emphasizes the critical role of simulations like Andorra’s upcoming national cyber exercise. “Cyber exercises like the one planned by Andorra are essential to test and strengthen national resilience against digital threats,” he states. Furthermore, Gascuel highlights the unique opportunity these exercises offer. “They allow us to gain feedback to improve or innovate new ways to enhance cybersecurity and resilience at the national level.”

Conclusion

This initiative positions Andorra as a leader in cybersecurity and highlights the significance of thorough national preparedness against cyber threats. Consequently, this cyber exercise might inspire other nations to adopt similar strategies, underscoring the critical importance of cybersecurity in today’s world.

Stay Updated

For more information and updates on this pioneering initiative, stay connected with official sources and local media.

source: https://andorra-digital.com/actualitat/lagencia-ciberseguretat-prepara-simulacio-datac-cibernetic

I encourage you to explore more articles on cyberculture by clicking here.

Cybersecurity Breach at IMF: A Detailed Investigation

Digital world map with cybersecurity icons representing the Cybersecurity Breach at IMF.

IMF Cyber Breach: A Review

Discover the intricate details of the IMF’s recent cybersecurity incident. Our investigative piece delves into the breach’s impact, showcasing advanced security solutions like Freemindtronic’s DataShielder ans PassCypher for enhanced email protection. Stay informed on safeguarding sensitive communications in our full analysis.

2024 Digital Security

Why Encrypt SMS? FBI and CISA Recommendations

2024 Digital Security

French Minister Phone Hack: Jean-Noël Barrot’s G7 Breach

2024 Digital Security

Cyberattack Exploits Backdoors: What You Need to Know

2024 Digital Security

Google Sheets Malware: The Voldemort Threat

2024 Articles Digital Security News

Russian Espionage Hacking Tools Revealed

2024 Digital Security Spying Technical News

Side-Channel Attacks via HDMI and AI: An Emerging Threat

Stay informed in our posts dedicated to Digital Security to follow its evolution thanks to our regularly updated topics

Delve into our comprehensive analysis of the IMF’s cybersecurity breach. Authored by Jacques Gascuel, this feature offers crucial insights to keep you informed and protected in the digital age.

Cybersecurity Breach at IMF: A Detailed Investigation

Cybersecurity breaches are a growing concern worldwide. The IMF recently experienced a significant cyber breach, highlighting the need for stringent security measures.

The Global Impact of the Cybersecurity Breach at IMF

The International Monetary Fund (IMF) is an institution of monumental importance, shaping economic policies and providing financial stability across the globe. The recent Cybersecurity Breach at IMF not only threatened its internal email communications but also posed a risk to the integrity of global financial systems. Such a breach at the IMF could have far-reaching consequences, potentially affecting economic decisions and market confidence worldwide.

Understanding the stakes of the Cybersecurity Breach at IMF is crucial. The IMF’s role in international economic governance means that any compromise of its systems could lead to significant disruptions. It’s a stark reminder of the ever-present need for rigorous cybersecurity defenses, especially within institutions that hold the world’s financial balance in their hands. The breach serves as a call to action for enhanced security protocols and measures to protect against future cyber threats.

On February 16, 2024, the IMF detected unauthorized access to eleven email accounts. This breach prompted an immediate investigation to assess the damage and prevent further intrusions. The IMF’s quick response included securing the compromised accounts and reviewing their cybersecurity protocols.

IMF’s Swift Response to Email Compromise

The IMF’s established cybersecurity program played a crucial role in the rapid containment of the breach. By following their incident response plan, the IMF minimized the potential impact of the cyber breach. The organization’s commitment to transparency and security is evident in their ongoing communication about the incident. “We can reveal that 11 IMF email accounts were compromised. They have since been re-secured. For security reasons, we cannot disclose more details,” a spokesperson for the IMF told BleepingComputer. The IMF added, “Yes, we can confirm, the IMF uses Microsoft 365 email. Based on our investigations to date, this incident does not appear to be part of Microsoft targeting.

Potential Risks and Content Extraction Speculations

The IMF’s recent confirmation of eleven compromised email accounts has sparked widespread concern. Yet, the organization withheld details on potential content extraction, citing security reasons. This secrecy fuels speculation about the breach’s scope and the risks tied to unauthorized access. Without concrete information, discussions on content extraction remain purely conjectural.

The IMF’s guarded statement to BleepingComputer, “For security reasons, we cannot disclose further details,” implies an ongoing investigation. It also reflects the IMF’s efforts to forestall additional breaches. This cautious approach underscores the intricate dance between openness and security that entities like the IMF must perform post-cyber incidents.

The Importance of Email Security

Email security is a critical aspect of data protection. The IMF’s incident underscores the necessity of vigilance and continuous improvement in cybersecurity measures. Organizations must stay ahead of threats to protect sensitive information. The recent breach at the IMF serves as a stark reminder of the vulnerabilities that exist and the importance of employing advanced encryption technologies and robust password management systems to safeguard communications.

Data Extraction from Compromised Emails: Clarification

The IMF cyberattack resulted in unauthorized access to eleven email accounts. However, it is crucial to clarify that there is currently no public information confirming the extraction of emails or attachments during the period before the security breach was detected and resolved. Therefore, this incident highlights potential risks and highlights the critical need to secure email communications to thwart unauthorized access and potential data mining. Additionally, ongoing IMF investigations are expected to reveal more about the scale of the breach and any data extraction that may have taken place. Understanding that, to obtain the most precise and recent information, it is appropriate to refer to official communications from the IMF.

Securing Emails with Advanced Technologies

To mitigate such risks, employing advanced encryption technologies like Freemindtronic’s EviPass NFC HSM and EviPass HSM PGP is essential. These technologies ensure that even if emails and attachments are compromised, they remain encrypted and unusable to cyber attackers. EviPass NFC HSM provides a robust layer of security by encrypting emails and their attachments, making unauthorized access significantly less impactful.

PassCypher: A Strong First Line of Defense

Incorporating PassCypher, a complex password manager, can effectively combat attacks that aim to corrupt email access. PassCypher’s technology, which includes EviPass NFC HSM and EviPass HSM PGP, serves as a formidable barrier against attackers, safeguarding email communications by managing complex passwords and encryption keys.

In conclusion on the email cybersecurity breach at the IMF

The IMF cyber breach serves as a reminder of the persistent threat of cyber attacks. It emphasizes the importance of preparedness and the need for robust cybersecurity defenses. As the investigation continues, the IMF’s experience will undoubtedly contribute to a deeper understanding of cybersecurity challenges and solutions.

For more information and to stay updated on the IMF’s cybersecurity efforts, please refer to the  IMF’s official communications.

Updated March 19 at 9:55 a.m. EDT: We have incorporated the latest IMF statements and information regarding email account security and the use of Microsoft 365. Consequently, the issue of extracting content from compromised emails remains unresolved, reflecting the ongoing nature of the investigation and the IMF’s discretion on specific details.

Midnight Blizzard Cyberattack Against Microsoft and HPE: What are the consequences?

Digital world map showing cyberattack paths with Midnight Blizzard, Microsoft, HPE logos, email symbols, and password spray illustrations.

Discover Russian Tactics by Midnight Blizzard

Midnight Blizzard, supported by Russian strategy, targeted Microsoft and HPE, orchestrating sophisticated cyberattacks. We delve into the facts, consequences, and effective protective measures such as PassCypher and DataShielder to combat this type of espionage.

2024 Digital Security

Why Encrypt SMS? FBI and CISA Recommendations

2024 Digital Security

French Minister Phone Hack: Jean-Noël Barrot’s G7 Breach

2024 Digital Security

Cyberattack Exploits Backdoors: What You Need to Know

2024 Digital Security

Google Sheets Malware: The Voldemort Threat

2024 Articles Digital Security News

Russian Espionage Hacking Tools Revealed

2024 Digital Security Spying Technical News

Side-Channel Attacks via HDMI and AI: An Emerging Threat

Stay informed in our posts dedicated to Digital Security to follow its evolution thanks to our regularly updated topics

Explore our digital security feature on the Midnight Blizzard cyberattack against Microsoft and HPE by Jacques Gascuel. Stay updated and secure with our insights.

Updated March 20, 2024

Midnight Blizzard Cyberattack against Microsoft and HPE: A detailed analysis of the facts, the impacts and the lessons to learn

In 2023 and 2024, two IT giants, Microsoft and Hewlett Packard Enterprise (HPE), which has been using Microsoft 365 as its cloud messaging platform since 2017), fell victim to cyberattacks carried out by a hacker group linked to the Russian government. These attacks allowed hackers to gain access to the internal systems, source code, and sensitive data of companies and their customers. What are the facts, consequences and lessons to be learned from these incidents?

Update: Microsoft 365 Cyberattack Intensifies

Initial Underestimation: Researchers reveal the cyberattack on Microsoft 365 is far more severe than first anticipated.
APT Exploits Data: The APT group, orchestrating the attack, has leveraged exfiltrated data to delve deeper into Microsoft’s network.
Security Experts Raise Concerns: Security professionals express concerns over disjointed defense teams. They fear unidentified vulnerabilities may persist.
Microsoft’s Stance: Popular opinion suggests Microsoft is ‘caught off-guard’ against such sophisticated attacks.
Ongoing Efforts: Microsoft is now bolstering defenses, ensuring tighter coordination across security teams to address these challenges.

For more details, refer to the official Microsoft Security Response Center update.

How were the attacks carried out against Microsoft and HPE?

The attacks on Microsoft and HPE were carried out by the same hacker group, Midnight Blizzard, which is linked to the Russian government. The hackers used the same technique to infiltrate the networks of both companies: compromising Microsoft 365 email. This cloud-based messaging platform is used by many organizations to communicate and collaborate.

“Password Spray” Attack Method Against Microsoft and HPE

The compromise of Microsoft 365’s email and HPE’s email accounts was achieved through a simple but effective method known as “password spraying.” This technique, often used after a brute force attack, involves guessing a password by trying several combinations, usually from previous data breaches.

The hackers used this method to gain access to an old test account on Microsoft’s network. Once they gained access, they were able to infiltrate HPE’s email accounts.

“Password spraying” is a technique where hackers use common passwords to attempt to gain access to multiple accounts on the same domain. Using a list of commonly used weak passwords, a hacker can potentially gain access to hundreds of accounts in a single attack. This differs from “Credential Stuffing”, where a single set of credentials is used to attempt to access different accounts across multiple domains.

In the case of the Midnight Blizzard attack on Microsoft, the hacker group used a password spray attack to compromise a legacy non-productive test account and gain a foothold. They then used the account’s permissions to gain access to a very small percentage of Microsoft’s corporate email accounts, including members of the executive team and employees in cybersecurity, legal, and other functions. They managed to exfiltrate some emails and attached documents.

Once they gained access to email accounts, the hackers were able to exfiltrate sensitive data, such as emails, attachments, source code, and secrets.

Method of attack against Microsoft and HPE customers “phishing, malware or social engineering”

Midnight Blizzard also used this data to carry out subsequent attacks against Microsoft and HPE customers, using phishing, malware, or social engineering techniques.

Why were the attacks successful?

  • Hackers exploited security vulnerabilities such as the lack of multi-factor authentication, the persistence of legacy test accounts, or weak passwords.
  • The hackers acted in a discreet manner, using advanced and persistent techniques, such as encrypting communications, masking IP addresses, or imitating legitimate behavior.
  • The hackers were supported by the Russian government, which provided them with resources, information, and diplomatic protection.

Here’s a diagram that summarizes the steps to Microsoft 365 email compromise:

Microsoft 365 email compromise diagram

Diagram depicting the 'Midnight Blizzard' cyberattack against Microsoft and HPE using password spray tactics.

Stages of Microsoft’s Security Breach

Microsoft endured a multi-phase assault:

November 2023 saw the initial breach when attackers cracked an outdated test account via password spray attacks, cycling through many potential passwords.

By December, those intruders had penetrated select executive and security team email accounts, extracting sensitive emails and documents.

January 2024 brought Microsoft’s detection and countermeasures to thwart further unauthorized access. The company identified Midnight Blizzard, known by aliases such as APT29 and Cozy Bear, as the culprits.

Come March, it was disclosed that the invaders had also accessed Microsoft’s code repositories and internal systems, utilizing the stolen intel for subsequent assaults on Microsoft’s clientele, targeting to exploit vulnerabilities or clone functionalities.

The different consequences of this attack on Microsoft

Consequences for Microsoft and its customers

The attack had significant consequences for Microsoft and its customers. On the one hand, Microsoft had to tighten its security measures, notify affected customers, investigate the extent of the compromise, and restore trust in its services.

On the other hand, Microsoft’s customers faced the risk of being targeted by subsequent attacks using information stolen from Microsoft, such as secrets, source code, or sensitive data. Some customers may have suffered financial losses, reputational damage, or privacy breaches.

Geopolitical consequence

The attack also had geopolitical consequences, as it revealed the Russian government’s involvement in large-scale cyber espionage operations against Western interests. It has drawn condemnation from several countries, including the United States, the United Kingdom, France and Germany, which have called for a coordinated and proportionate response to the threat. It also reinforced the need to strengthen international cooperation on cybersecurity and to define common standards to prevent conflicts in cyberspace.

Steps to attack HPE

Midnight Blizzard executed the attack on HPE, leveraging Microsoft 365 email for entry—the platform HPE adopted in 2017.

Initially, in May 2023, the hackers infiltrated SharePoint, extracting a select set of files. Post-breach, HPE, alongside cybersecurity experts, promptly engaged in containment and recovery efforts.

Come December, new breaches surfaced; targeted mailboxes related to cybersecurity and business operations were compromised. These intrusions were suspected to be connected to the earlier SharePoint incident.

Finally, in January 2024, HPE disclosed the breach to the SEC, affirming the implementation of measures to remove the threat, alert impacted clients, gauge the breach’s scope, and reinstate service integrity.

The different consequences of this attack on HPE

First, the attack had similar consequences to the attack on Microsoft, but on a smaller scale.

Restoring trust in its services to their customersOn the one hand, HPE had to strengthen its security measures, inform affected customers, and restore trust in its services. HPE’s customers faced the risk of being targeted by subsequent attacks using information stolen from HPE, such as sensitive data.

Justify the lack of economic impact as a result of this attack

On the other hand, HPE stated that the incident did not have a material impact on its operations, financial condition or results of operations.

The similarities and differences between the two attacks

Both attacks were carried out by the same hacking group, Midnight Blizzard, which is linked to the Russian government. Both attacks used the same means of access, Microsoft 365 email, which is a cloud-based email platform used by many organizations. Both attacks allowed hackers to exfiltrate sensitive data, such as emails, attachments, source code, or secrets. Both attacks had consequences for the victim companies, their customers, and geopolitics.

There were also differences between the two attacks. The attack on Microsoft was longer, deeper, and more widespread than the attack on HPE. The attack on Microsoft lasted several months, while the attack on HPE lasted a few weeks. The attack on Microsoft allowed the attackers to gain access to the company’s source code repositories and internal systems, while the attack on HPE was limited to email and SharePoint files. The attack on Microsoft affected thousands of customers, while the attack on HPE did not specify how many customers were affected.

What types of data does Midnight Blizzard exfiltrate?

What types of data does Midnight Blizzard exfiltrate?

Midnight Blizzard is the name given to a group of cybercriminals who have carried out cyber attacks against Microsoft, HPE, and their customers. This group is also known as Nobelium, Cozy Bear, or APT29. It managed to break into these companies’ cloud email systems and steal sensitive data. Microsoft said that Midnight Blizzard also accessed some of its source code and internal systems, but that it did not compromise Microsoft-hosted client systems.

“In recent weeks, we have seen Midnight Blizzard [Nobelium] use information initially exfiltrated from our corporate email systems to obtain, or attempt to obtain, unauthorized access,” Microsoft said in a blog post. “This includes access to some of the company’s source code repositories and internal systems. To date, we have found no evidence that Microsoft-hosted client systems have been compromised.”

Midnight Blizzard Exfiltrated Data Category

The data exfiltrated by Midnight Blizzard can be grouped into three main categories:

Communication data

Communication data is data that relates to interactions between Microsoft and HPE employees, partners, or customers. They include emails, attachments, contacts, calendars, notes, or instant messages. This data may contain confidential, strategic or personal information, such as trade secrets, project plans, contracts, reports, opinions, identifiers. This data was exfiltrated at Microsoft and HPE.

Source code data

Source code data is data that relates to the development of Microsoft’s products or services. They include files, repositories, versions, comments, or tests related to the source code. This data may reveal technical, functional, or security information, such as algorithms, architectures, features, vulnerabilities, patches, or backdoors. This data was exfiltrated only at Microsoft.

Internal system data

Communication and internal system data is data that relates to the exchange and operation of Microsoft and HPE’s internal systems. This includes emails, attachments, contacts, calendars, notes, instant messages, files, configurations, logs, audits, or scans of internal systems. This data may contain confidential, strategic or personal information, such as trade secrets, project plans, contracts, reports, opinions, identifiers. This data can also provide information about the performance, security, or reliability of internal systems. This data was exfiltrated at Microsoft and HPE.

What are the estimated values of the data exfiltrated by Midnight Blizzard?

It is difficult to estimate the exact value of the data exfiltrated by Midnight Blizzard, as it depends on several factors, such as the quantity, quality, freshness, rarity, or usefulness of the data. However, an approximate range can be attempted based on official sources or existing studies.

HPE’s SEC filing indicates that the security incident’s repercussions on their operational, financial, or business performance were minimal. This suggests the exfiltrated data’s worth is on the lower end, possibly just a few thousand dollars. On the other hand, Microsoft’s annual report documents a staggering $168.1 billion in revenue for 2023, with $60.7 billion attributed to their cloud division. Such figures lead to the conclusion that the stolen data from Microsoft could be highly valuable, potentially in the millions. Further, the Ponemon Institute’s study reports the average data breach cost in 2023 at $4.24 million, the highest to date, encompassing various associated costs. These costs include activities like detection and response, as well as indirect losses like diminished productivity and tarnished reputation. Therefore, it stands to reason that the value of data taken from Microsoft and HPE’s customers is similarly high, potentially reaching tens of millions of dollars.

What are the potential consequences of the data exfiltrated by Midnight Blizzard?

The data exfiltrated by Midnight Blizzard can have serious potential consequences for the victim companies, their customers, and geopolitics. Here are a few examples:

  • Communication data can be used to carry out phishing, malware, or social engineering attacks, impersonating trusted individuals, exploiting security vulnerabilities, or manipulating emotions. These attacks can aim to steal other data, take control of systems, destroy or alter data, or extort ransoms.
  • Source code data can be used to discover and exploit vulnerabilities, to copy or modify functionality, to create competing products or services, or to infringe intellectual property. These actions may adversely affect the security, quality, innovation, or competitiveness of Microsoft or HPE products or services.
  • Internal system data may be used to understand and disrupt Microsoft or HPE’s operations, organization, or performance, to reveal sensitive or confidential information, to create false information or rumors, or to influence decisions or behaviors. These actions may damage the reputation, trust, satisfaction, or loyalty of Microsoft or HPE customers, partners, or employees.

How could PassCypher HSM have prevented the cyberattack on Microsoft and HPE?

The cyberattack on Microsoft and HPE used weak or reused passwords to access email accounts. PassCypher NFC HSM or PassCypher HSM PGP is a hardware-based password manager, which allows you to create and use strong, unique, and random passwords, without knowing, remembering, displaying, or entering them manually. It uses Freemindtronic’s EviCore HSM PGP or EviCore NFC HSM technology to communicate contactlessly with compatible devices, and has a complicated and complex random password generator with self-entropy control based on shannon mathematical calculation.

With PassCypher NFC HSM or PassCypher HSM PGP solutions, users can effectively protect themselves against password spray attacks quickly, easily, and even free of charge. This is because PassCypher HSM PGP is originally completely free. He presented for the first time in Marseille on 6-7 March 2024 at AccessSecurity at the PhosPhorus Technology stand, partner of Fullsecure Andorra.

How could DataShielder have protected email messages and email attachments from being exfiltrated by hackers?

As you read more in this article, the cyberattack against Microsoft and HPE exfiltrated communication data, such as emails, attachments, contacts, notes, or instant messages. DataShielder NFC HSM or DataShielder HSM PGP are solutions for encrypting post-quantum data via NFC HSM or HSM PGP. Users encrypt and decrypt their communication data, only from their HSMs via physically outsourced segmented keys from the IT or phone systems. It works without a server or database and without any dependency on the security of communication systems. Of course, without the need to connect to an online service, or entrust your encryption keys to a third party. They have a random AES-256 encryption key generator. In particular, it embeds Freemindtronic’s EviCypher technology, which also encrypts webmail such as Outlook. With DataShielder solutions, users can protect themselves from data exfiltration by hackers and ensure the confidentiality, integrity, and authenticity of their communications.

Recommendations to protect yourself from cyber threats

The cyberattacks against Microsoft and HPE show that cyber threats are real, growing, and sophisticated. They also show that businesses of all sizes, industries, and locations need to take cybersecurity seriously and adopt best practices to protect themselves effectively. Here are some recommendations:

  • Enable multi-factor authentication, which involves requiring two or more credentials to log in to an account, such as a password and a code sent via SMS or email. This helps reduce the risk of being compromised by a password spray attack.
  • Review account permissions, which determine access rights to company resources and data. This helps limit the risk of an attack spreading from a compromised account.
  • Monitor suspicious activity, which may indicate an attempted or successful attack, such as unusual logins, file changes, data transfers, or security alerts. This makes it possible to detect and stop an attack as early as possible.
  • Use security solutions that provide protection, detection, and response to cyber threats, such as antivirus, firewalls, intrusion detection and prevention systems, or monitoring and analytics services. This makes it possible to strengthen the security of the information system and to benefit from the expertise of cybersecurity professionals.
  • Educate users, who are often the weakest link in the security chain, and who can fall victim to phishing, malware, or social engineering. This includes training them in good cybersecurity practices, informing them of the risks and instructions to follow in the event of an incident, and encouraging them to adopt responsible and vigilant behavior.

In conclusion

In conclusion, Midnight Blizzard’s cyberattacks expose critical vulnerabilities in global tech infrastructure. Through these incidents, we learn the importance of robust security measures like PassCypher and DataShielder. Moving forward, adopting advanced defenses and staying informed are key to combating future threats. Let’s embrace these lessons and protect our digital world.

Sources:

Chinese cyber espionage: a data leak reveals the secrets of their hackers

Unprecedented Data Leaks Expose Chinese Cyber Espionage Programs

Following an unprecedented data leak from a Beijing regime hacking service provider, the secrets of Chinese cyberespionage are revealed. The I-Soon company is said to have infiltrated dozens of strategic targets around the world. This is what you will discover here by reading this brief cyberculture. Unprecedented data leaks reveal China’s cyberespionage program.
Following an unprecedented data leak from a Beijing regime hacking service provider, the secrets of Chinese cyberespionage are revealed. Based on the analysis of this data, it appears that the I-Soon company has infiltrated dozens of strategic targets around the world. This is what you will discover here by reading this brief Cyberculture.

2024 Digital Security

Why Encrypt SMS? FBI and CISA Recommendations

2024 Digital Security

French Minister Phone Hack: Jean-Noël Barrot’s G7 Breach

2024 Digital Security

Cyberattack Exploits Backdoors: What You Need to Know

2024 Digital Security

Google Sheets Malware: The Voldemort Threat

2024 Articles Digital Security News

Russian Espionage Hacking Tools Revealed

2024 Digital Security Spying Technical News

Side-Channel Attacks via HDMI and AI: An Emerging Threat

Stay informed with our posts dedicated to Cyberculture to track its evolution through our regularly updated topics.

Read the secrets of Chinese cyber espionage revealed by an unprecedented data leak, written by Jacques Gascuel, a pioneer of contactless, serverless and databaseless sensitive data security solutions. Stay up to date and secure with our frequent updates..

Chinese cyber espionage I-Soon: A data leak reveals the secrets of their hackers

Chinese cyber espionage poses a serious threat to the security and stability of the world. Many countries and organizations face hackers who try to steal sensitive information, disrupt critical infrastructure, or influence political outcomes. One of the most active and sophisticated cyber espionage actors is China, which has a large and diverse hacking program. But how does China conduct its cyber operations? What methods, targets, and objectives does it have? And how can we protect ourselves from its attacks?

In this brief, we will explore these questions of Chinese cyber espionage, based on a recent data leak that revealed the inner workings of a Chinese cybersecurity vendor working for the Chinese government. The vendor, I-Soon, is a private contractor that operates as an advanced persistent threat (APT) for hire, serving the Chinese Ministry of Public Security (MPS). The leaked data, published on GitHub, contains hundreds of documents that document I-Soon’s Chinese cyber espionage activities, from staff complaints to hacking tools and services.

We will also look at some of the solutions that exist to counter the cyber espionage threat, both from a technical and a strategic perspective. We will focus on the solutions developed by Freemindtronic, an Andorran company that specializes in security and encryption technologies, based on the NFC HSM (Near Field Communication and Hardware Security Module) technology. We will also examine the means of counter espionage against the methods of I-Soon, which are varied and sophisticated.

I-Soon data leak reveals insight into Chinese cyber espionage hacking program

The I-Soon data leak is a significant revelation in Chinese cyber espionage, as it offers a rare glimpse into the inner workings of a major spyware and APT-for-hire provider. The leak exposes I-Soon’s methods, tools and goals, as well as the challenges and frustrations of its staff.

According to the leaked data, I-Soon infiltrated several government agencies, including those from India, Thailand, Vietnam, South Korea, and NATO. Some of the tools that I-Soon used are impressive. For example, they had a tool that could steal the user’s Twitter email and phone number, read personal messages, and publish tweets on the user’s behalf. They also had custom Remote Access Trojans (RATs) for Windows, iOS, and Android, that could perform various malicious actions, such as keylogging, file access logging, process management, and remote shell. They also had portable devices for attacking networks from the inside, and special equipment for operatives working abroad to establish safe communication.

The leak also reveals some of the challenges and difficulties that I-Soon faced, such as losing access to some of their data seized from government agencies, dealing with corrupt officials, and working in sensitive regions like Xinjiang. The leak also shows some of the internal complaints and grievances of I-Soon’s staff, such as low pay, poor management, and lack of recognition.

The leak is a treasure trove of intel for cybersecurity researchers and analysts, as it provides a rare insight into the day-to-day operations of China’s hacking program, which the FBI says is the biggest of any country. The leak also raises serious concerns for the security and sovereignty of the countries and organizations targeted by I-Soon, as it exposes the extent and the impact of China’s cyber espionage activities.

In summary, the I-Soon data leak exposed the secrets of Chinese cyber espionage, which poses a major challenge to world security and stability. Faced with this threat, it is necessary to strengthen cooperation and defense in cybersecurity, while respecting the principles of freedom and transparency on the internet. It is also important to understand China’s motivations and objectives, in order to find peaceful and lasting solutions.

Reactions and challenges to the Chinese cyber espionage threat

The revelation of the I-Soon data leak comes amid growing tensions between China and its rivals, notably the United States, which regularly accuses it of carrying out cyberattacks against their interests. China, for its part, denies any involvement and presents itself as a victim of cyberwar. Faced with this threat, the countries targeted by I-Soon are calling for strengthening their cooperation and defense in cybersecurity.

For example, the European Union adopted a legal framework in 2023 to impose sanctions on perpetrators of cyberattacks, including China. Likewise, NATO has recognized cyberspace as a domain of operation, and affirmed its willingness to retaliate in the event of an attack. Finally, democratic countries have launched initiatives to promote the values ​​of freedom and transparency on the internet, such as the Partnership for an Open and Secure Cyberspace.

However, these efforts remain insufficient to confront the Chinese threat, which has considerable resources and sophisticated strategies. It is therefore necessary to develop a global and coordinated approach, which involves governments, businesses, organizations and citizens. This would involve strengthening the resilience of information systems, sharing information and good practices, raising users’ awareness of the risks and opportunities of cyberspace, and promoting constructive dialogue with China.

The solutions of Freemindtronic against the cyber espionage threat

Facing the cyber espionage threat, especially from China, requires effective and adapted solutions, both from a technical and a strategic perspective. One of the companies that offers such solutions is Freemindtronic, an Andorran company that develops security and encryption technologies, based on the NFC HSM (Near Field Communication and Hardware Security Module) technology. The NFC HSM technology allows to create hardware security modules on any type of device, that ensure the encryption and the signature of any data, without contact, without energy source, and without internet connection.

Freemindtronic offers several solutions against the cyber espionage DataShielder Defense NFC HSM: a solution for sovereign communications, that allows to encrypt and sign any data on any type of device, with an unmatched level of confidentiality and trust. DataShielder uses the EviCore HSM OpenPGP technology, which is interoperable, retrocompatible, and versatile. DataShielder allows to customize the security of secrets, and to meet various specific needs.

  • PassCypher NFC HSM: a solution for the management and storage of passwords, that allows to create, store, and use complex and secure passwords, without having to remember or enter them. PassCypher uses the EviPass NFC HSM technology, as well as the NFC HSM devices of Freemindtronic, EviTag and EviCard. PassCypher offers a maximum security and a simplicity of use.
  • PassCypher HSM PGP: a solution for the management and storage of PGP keys, that allows to create, store, and use PGP keys, certificates, and signatures, without having to remember or enter them. PassCypher uses the EviCore HSM OpenPGP technology, as well as a hybrid solution via a web extension. PassCypher works without server and without database, and stores the encrypted containers on any storage device, protected by a post-quantum AES-256 encryption.

These solutions of Freemindtronic allow to protect oneself from the cyber espionage threat, by encrypting and signing the data, by managing and storing the passwords and the keys, and by communicating in a confidential and sovereign way. They are based on the NFC HSM technology, which guarantees a hardware and software security, without contact, without energy source, and without internet connection.

The means of counter espionage against the methods of I-Soon

Against the methods of cyber espionage of I-Soon, which are varied and sophisticated, the countries and organizations targeted must implement effective and adapted means of counter espionage. These means can be of several types:

  • Preventive: they consist of strengthening the security of the information systems, by using up-to-date software, antivirus, firewall, complex passwords, encryption protocols, etc. They also consist of training the users to good practices, such as not opening suspicious attachments or links, not disclosing confidential information, not using public or unsecured networks, etc.
  • Defensive: they consist of detecting and blocking the intrusion attempts, by using tools of surveillance, analysis, tracing, filtering, neutralization, etc. They also consist of reacting quickly and limiting the damage, by isolating the compromised systems, backing up the data, alerting the competent authorities, communicating transparently, etc.
  • Offensive: they consist of retaliating and deterring the attackers, by using tools of counter-attack, disinformation, sabotage, sanction, etc. They also consist of cooperating with the allies and partners, by sharing the information, the evidence, the strategies, the resources, etc.

These means of counter espionage must be adapted to the specificities of the methods of I-Soon, which are varied and sophisticated. For example, to face the security flaws, it is necessary to use trustworthy software, verify their integrity, and update them regularly. To face the malware, it is necessary to use efficient antivirus, scan the systems regularly, and clean them in case of infection. To face the social engineering techniques, it is necessary to raise the awareness of the users, verify the identity and the credibility of the interlocutors, and not let oneself be influenced or corrupted.

Chinese cyberespionage statistics

The I-Soon data leak constitutes unprecedented testimony to the scale and impact of Chinese cyberespionage, which is based on close collaboration between the authorities and the private sector. Here are some statistics that illustrate the phenomenon:

China spent at least US$6.6 billion on cyber censorship in 2020, according to the Jamestown Foundation.

According to official sources, at least 2 million people were working for China’s cyberespionage system in 2013, a number that has almost certainly increased over the past eight years.
GreatFire, a censorship monitoring organization in China, estimates that 16% of the world’s 1,000 most visited websites are currently blocked in China.
In 2022, ANSSI handled 19 cyber defense operations and major incidents, compared to 17 in 2021. Nine of them were intrusions attributed to Chinese actors.

In conclusion, the means of counter espionage against the methods of I-Soon are essential to protect the interests and the sovereignty of the countries and organizations targeted. They must be implemented in a coordinated and proportionate way, respecting the principles of legality and legitimacy.

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.