A massive cyber spying effort – linked to a government-backed group operating out of Asia – has breached governmental bodies and essential infrastructure targets in 37 nations, recent findings by Palo Alto Networks reveal. Known under the identifier TGR-STA-1030, the assault reached more than 70 institutions during the last twelve months. This intrusion ranks among the broadest state-associated hacking episodes seen since the major compromise involving SolarWinds back in 2020.
Peter Renals, principal security researcher with Palo Alto’s Unit 42 threat intelligence team, told Axios that government agencies and critical infrastructure organizations in the United States and United Kingdom were not impacted.
Timing of the cyber intrusions seemed tightly linked to key political and economic moments. Around a month prior to Honduras’ presidential vote – marked by discussions on Taiwan relations – numerous state-linked IPs faced targeting.
Facing rising cyber threats, European authorities saw increased digital intrusions. After Czech leader Petr Pavel met with the Dalai Lama, scans appeared across defense, law enforcement, legislative, and administrative systems in the country. In parallel, German infrastructure came under scrutiny – close to five hundred public-sector internet addresses were probed that summer.
Beginning with digital deception, the group used fake emails alongside unpatched security holes to enter systems. Exploiting weaknesses in tools like Microsoft Exchange Server and SAP Solution Manager was observed by analysts tracking their moves. Hidden inside compromised machines, a stealthy program named ShadowGuard took root beneath regular operating layers.
Alone between November and December, scans hit infrastructure across 155 nations – evidence of persistent probing ahead of possible follow-up actions. Though Palo Alto Networks alerted impacted governments and collaborators, the group behind the activit
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article:
