Cybersecurity firm Cybereason finds China-linked APT 41 took hundreds of gigabytes of IP and sensitive data from ~30 tech and manufacturing companies since 2019 公司筆電收購

公司筆電收購
hed a malicious campaign — dubbed Operation CuckooBees — exfiltrating hundreds of 公司筆電收購gigabytes of intellectual property and sensitive data, including blueprints, diagrams, formulas, and manufacturing-related proprietary data from multiple intrusions, spanning technology and manufacturing companies in North America, Europe, and Asia.  “We’re talking about Blueprint diagrams of fighter jets, helicopters, and missiles,” Cybereason CEO Lior Div told CBS News. In pharmaceuticals, “we saw them stealing IP of drugs around diabetes, obesity, depression.” The campaign has not yet been stopped.

Cybercriminals were focused on obtaining blueprints for cutting-edge technologies, the majority of which were not yet patented, Div said.The intrusion also exfiltrated data from the energy industry – including designs of solar panel and edge vacuum system technology. “This is not [technology] that you have at home,” Div noted. “It’s what you need for large-scale manufacturing plants.”

The report doesn’t disclose a list of affected companies, but researchers found the cyber espionage campaign — which had been operating undetected since at least early 2019 — collected information that could be used for future cyberattacks or for potential extortion campaigns — details about companies’ business units, network architecture, user accounts and credentials, employee emails and customer data.   Cybereason first caught wind of the operation in April of 2021, after a company flagged a potential intrusion during a business pitch meeting with the cybersecurity firm. Analysts reverse engineered the attack to uncover every step malicious actors took inside the environment, discovering APT 41 “maintained full access to everything in the network in order for them to pick and choose the right information that they needed to collect.”That full access enabled cybercriminals to exfiltrate tedious amounts of information required to duplicate complicated engineering, including rocket propelled weapons. “For example, to rebuild a missile there are hundreds of pieces of information that you need to steal in a specific way in order to be able to recreate and rebuild that technology,” Div said.APT 41 or “Winnti” – which also goes by affiliate names BARIUM and Blackfly – remains one of the most prolific and successful a Chinese state-sponsored threat groups, with a history of launching CCP backed espionage activity and financially motivated attacks on U.S. and other international targets, routinely aligned with China’s Five-Year economic development plans.

In May 2021, the Justice Department charged four Chinese nationals connected to APT 41 for their participation in a global computer intrusion campaign targeting intellectual property and sensitive business information. The FBI estimated in its report that the annual cost to the U.S. economy of counterfeit goods, pirated software, and theft of trade secrets is between $225 billion and $600 billion.But researchers from Cybereason say it is hard to estimate the exact economic impact of Operation CuckooBees due to the complexity, stealth and sophistication of the attacks, as well as the long-term impact of robbing multi-national companies of research and development building blocks.  “It’s important to account for the full supply chain – basically selling a developed product in the future, and all the derivatives that you’re gonna get out of it,” Div said.”In our assessment, we believe that we’re talking about trillions, not billions,” Div added. “The real impact is something we’re going to see in five years from now, ten years for now, when we think that we have the upper hand on pharmaceutical, energy, and defense technologies. And we’re going to look at China and say, how did they bridge the gap so quickly without the engineers and resources?”Cybersecurity firms including Eset Research have previously detailed supply chain attacks carried out by APT 41. In August 2019, Mandiant released a report detailing the evolution of the group’s tactics, and techniques, as well as descriptions of individual criminal actors. According to Cybereason’s report, the APT group leveraged both known and previously undocumented malware exploits, using “digitally signed kernel-level rootkits as well as an elaborate multi-stage infection chain,” comprising six parts. That clandestine playbook helped criminals gain unauthorized control of computer systems while remaining undetected for years. 

The FBI has consistently warned that China poses the largest counterintelligence threat to the U.S.”[China has] a bigger hacking program than that of every other major nation combined. And their biggest target is, of course, the United States,” FBI Director Christopher Wray said Friday, during a public forum at the McCain Institute. The CCP continues to increase its theft of U.S. technology and intellectual property by conducting illicit economic activities, according to the latest annual survey by the Office of the U.S. Trade Representative.Wray says the FBI opens a new China counterintelligence investigation every12 hours. Last year, the U.S. government attributed a massive attack targeting Microsoft Exchange servers  to the Chinese state actors. “Across the Chinese state, in pretty much every major city, they have thousands of either Chinese government or Chinese government-contracted hackers who spend all day – with a lot of funding and very sophisticated tools – trying to figure out how to hack into companies netwo

公司筆電收購

▲intel 攜手國內外電腦大廠一起慶祝第11代處理器上市。(圖/記者洪聖壹攝,下同)

特約記者洪聖壹/綜合報導

受到疫情影響,今年intel難得在台灣舉辦桌上型處理器上市記者會,這也是全球少數舉辦實體上市活動的地區,活動現場有來自國內外共計 11 家廠商參與,並且展出採用第11代處理器的相關產品。

英特爾台灣分公司業務暨行銷總經理汪佳慧指出,採用14奈米製程的Rocket Lake,最高擁有8核心16執行緒,採用Cypress Cove微架構,不管是效能、圖形運算、AI 這三個區塊在第11代產品都有顯著成長,她也相當看好產品上市後在市場上的表現,同時也強調不管是半導體還是 intel 在台灣的 PC、資料中心、5G物聯網、AI 或雲端等,都會繼續投資台灣,並繼續與台灣第三方公司合作,一起服務全世界。

公司筆電收購

第11代 intel Core 桌上型處理器系列最高擁有 8 核心 16 執行緒,擁有三大特色,第一個是 IPC 的提升、第二是顯示效能的提升,再來就是超頻變得更穩定而且便利。

公司筆電收購

因應玩家需求,全新 Cypress Cove 微架構,讓整個 IPC 效能比上一代提升 19%,透過intel Adaptive Boost Technology(ABT)提升多核心、多執行緒表現。

第11代 intel Core i7、i5 桌上型處理器最大特色就是相容 DDR4-3200。i3 可以說是上一代的再提升,最多支援 DDR4-2666。在超頻方面,10代以前都記憶體控制上只能支援Gear 1,但是11代(部分i5與i7)可以支援到Gear 2,藉此讓 CPU 只要跑一半的頻率,就可以達到超頻需求,如此一來對於大部分的遊戲來說就具有更多的相容性,而且對於合作夥伴來說,操作性更簡單。

除了相容性,另一個亮點是針對機器學習方面,新增了intel Deep Learning Boost 功能(VNNI指令集),大幅度加速 AI 應用,另外 Gaussian & Neural Accelerator(GNA)使用超低功耗處理 AI 語音應用,而且 PCIe 也提升到Gen4 ,這代表將大幅提升 NVMeSSD 讀寫效。

在顯示核心方面,內建 UHD Graphics 採用最新 X 架構,提升能源效率,另外受惠於新的媒體區塊,新增了 AV1 硬體解碼,相同編碼效率相較 HEVC/H.256 提供更精緻的畫質。

在 500 系列晶片組,Z590、H570 用以銜接處理器的 DMI 3.0 升級到 8 通道,撐起 NVMe SSD 和 USB 3.2 Gen 2X2 所需頻寬,也能夠以獨立晶片或者無線網卡支援 Thunderbolt 4 或者 Wifi 6W。H570、B560  晶片組更首次支援記憶體超頻。新的處理器提供Gen 2 和更寬廣的時序調節,Windows 作業系統環境,能夠透過 intel Extreme Tuning Utility 及時調整運及時調整運作記憶體時脈。

公司筆電收購

這次活動當中,包括宏碁、華碩、華碩、華擎、戴爾、惠普、技嘉、微星、聯想、映泰、美超微等廠商同台展示旗下最新產品,分述如下:

公司筆電收購

▲ACER 在現場展示 Acer Nitro 50 桌上型電腦等多項產品,主機著重提供FrostBlade冷卻功能。(圖/記者洪聖壹攝)

公司筆電收購

▲ASROCK 展出 Z590 Taichi 等多項產品,著重產品擴充性跟散熱能力。(圖/記者洪聖壹攝)

公司筆電收購

▲華碩ROG展示多項旗艦產品,其中ROG STRIX GT35主機特色除了散熱系統,甚至還支援兩組SSD熱插拔擴充。(圖/記者洪聖壹攝)

公司筆電收購

▲Dell展示的桌上型電腦 Alienware Aurora R12除了著重高效散熱,特色是內部散熱氣流通風設計,並且標榜無需工具就可以輕鬆升級。(圖/記者洪聖壹攝)

公司筆電收購

▲MSI的Aegis Ti5 採用Silent Storm Cooling 4散熱設計,並且擁有Gaming Dial 可以一鍵超頻。(圖/記者洪聖壹攝)

公司筆電收購

▲公司筆電收購gigabyte 的AORUS Z590主機標榜先進供電、頂級散熱,主機外型就像裝甲一樣,是全場展示的最大主機。(圖/記者洪聖壹攝

公司筆電收購

▲BIOSTAR充滿女性玩家味道,今年首發的女武神機板著重強悍的供電效率,並且特別用「盔甲」包覆散熱風扇,主機Z590 VALKYRIE則標榜效能、散熱、供電、與設計。(圖/記者洪聖壹攝)

公司筆電收購

▲HP這次展示僅針對舊產品做一個硬體升級的動作。(圖/記者洪聖壹攝)

公司筆電收購

▲Lenovo 展示兩款主機組合,其中 Legion Tower 5 裝下 RTX 3060Ti 顯卡,標榜冷冽狂暴的效能。(圖/記者洪聖壹攝)

公司筆電收購

▲SUPERMICRO今年在自行開發的主板當中也著重散熱機制的再提升,也是全場少見的水冷式散熱。(圖/記者洪聖壹攝)

公司筆電收購 公司筆電收購

發佈留言

發佈留言必須填寫的電子郵件地址不會公開。 必填欄位標示為 *