logo
US arrests Chinese hacker Xu Zewei for stealing COVID-19 research and hacking Microsoft servers

US arrests Chinese hacker Xu Zewei for stealing COVID-19 research and hacking Microsoft servers

Time of Indiaa day ago
Xu Zewei, a Chinese national, has been apprehended in Italy following a U.S. extradition request for his involvement in hacking activities. He is accused of stealing COVID-19 research from American universities and orchestrating a massive attack on Microsoft Exchange servers. These actions are linked to the Hafnium group, which has ties to the Chinese government.
Tired of too many ads?
Remove Ads
Chinese hackers stole COVID research and attacked Microsoft servers
Tired of too many ads?
Remove Ads
FAQs
The U.S. Justice Department confirmed the arrest of Chinese national Xu Zewei , a suspected contract hacker for the Chinese government. Xu was arrested in Italy after the U.S. requested his extradition, according to the report by TechCrunch.He allegedly worked for a Chinese tech company called Shanghai Powerock Network, which helped China with hacking operations. Xu and another Chinese hacker named Zhang Yu, who is still on the run, were charged with 9 serious hacking crimes in the U.S, as stated by the reports.The U.S. says they stole sensitive COVID-19 research from American universities in February 2020, during the early pandemic. They are accused of cyber spying and data theft, which could have given China an edge in vaccine or treatment research, according to the report by TechCrunch.Xu and his group also carried out a massive hacking attack on Microsoft Exchange servers in March 2021. The hackers broke into over 60,000 email servers across the U.S., mostly run by small businesses, and stole private emails and contact info, as per the reports.The U.S. says the hackers are part of a Chinese hacking group called Hafnium, linked to Beijing. Hafnium later started a new cyberattack campaign called Silk Typhoon, known for targeting large companies and U.S. government agencies, according to the report by TechCrunch.Xu Zewei is a Chinese hacker arrested in Italy for stealing U.S. COVID-19 research and hacking Microsoft servers, as per U.S. Justice Department.Hafnium is a China-linked hacker group accused of major cyberattacks on U.S. companies and government email servers, including Microsoft Exchange.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

ED searches farm neta among 'donkey route' agents in illegal immigration case
ED searches farm neta among 'donkey route' agents in illegal immigration case

Time of India

time2 hours ago

  • Time of India

ED searches farm neta among 'donkey route' agents in illegal immigration case

BATHINDA/NEW DELHI: In a massive crackdown on illegal immigration rackets operating from several cities in Punjab and Haryana, the Enforcement Director on Wednesday conducted searches at 11 locations in seven cities on some of these agents, including on the premises of farmers' union leader , also known as Sukh Gill, the president of BKU (Totewal) faction, for their involvement in sending unsuspecting people through the 'donkey route' to the US. Tired of too many ads? go ad free now ED officials spent several hours inside Gill's house at Tota Singh Wala village in Moga district, around 80 km from Ludhiana, and went through various documents, sources said. Gill, who was not at home when the ED team arrived, said he had nothing to hide and that some people were conspiring against him. He said the complaint against him was false and he was open to being investigated by any agency. ED searches were carried out in Amritsar, Sangrur, Patiala, Moga, Ambala, Kurukshetra and Karnal on agents who were found charging Rs 40-50 lakh each from victims, promising to send them to the US through legal channels. At least 400 such people were deported, handcuffed and chained, by the US in military aircraft since Feb. Soon after their arrival in India, the ED began its probe and recorded statements of the victims of 'immigration fraud'. Questioning revealed the names of agents who were behind this racket, a senior official said. The ED's money laundering investigation is based on 17 FIRs registered by police in Punjab and Haryana against some of these travel agents and middlemen offering to arrange 'visas' by the American embassy. "During investigation, it was gathered that the agents used to target people who wanted to immigrate to the US. Promising them migration through legal channels and through flights, the agents charged them huge amounts (around Rs 45-50 lakh per candidate)," a source said. However, the agents later forced them to take the donkey route (illegal channel) by crossing the land borders of many countries, sometimes illegally through dangerous forests "under the influence of mafias". Tired of too many ads? go ad free now These agents, in collusion with mafias at border crossings, created threatening situations for illegal migrants and their families during their journey, and were forced to pay more money, besides the Rs 40-50 lakh charged at the beginning. The revelations were made by some of the deportees when they were interrogated by the ED.

Russia unleashes record 700-drone barrage on Ukraine, its largest of the war: Officials
Russia unleashes record 700-drone barrage on Ukraine, its largest of the war: Officials

Hindustan Times

time3 hours ago

  • Hindustan Times

Russia unleashes record 700-drone barrage on Ukraine, its largest of the war: Officials

Russia fired more than 700 attack and decoy drones at Ukraine overnight, topping previous nightly barrages for the third time in two weeks, part of Moscow's intensifying aerial and ground assault in the three-year war, Ukrainian officials said Wednesday. Ukrainian law enforcement officers work next to a crater following a drone attack in Kharkiv.(AFP) Russia has recently sought to overwhelm Ukraine's air defenses by launching major attacks that include increasing numbers of decoy drones. The most recent one appeared aimed at disrupting Ukraine's vital supply of Western weapons. The city of Lutsk, home to airfields used by the Ukrainian army, was the hardest hit, according to Ukrainian President Volodymyr Zelenskyy. It lies near the border with Poland in western Ukraine, a region that is a crucial hub for receiving foreign military aid. The attack comes at a time of increased uncertainty over the supply of crucial American weapons and as U.S.-led peace efforts have stalled. Zelenskyy said that the Kremlin was 'making a point' with it. The Russian Defense Ministry said its forces took aim at Ukrainian air bases and that 'all the designated targets have been hit.' Meanwhile, Ukraine fired drones into Russia overnight, killing three people in the Kursk border region, including a 5-year-old boy, the local governor said. The Russian attack, which included 728 drones and 13 missiles, had the largest number of drones fired in a single night in the war. On Friday, Russia fired 550 drones, less than a week after it launched 477, both the largest at the time, officials said. Beyond Lutsk, 10 regions were struck. One person was killed in the Khmelnytskyi region, and two wounded in the Kyiv region, officials said. Poland, a member of NATO, scrambled its fighter jets and put its armed forces on the highest level of alert in response to the attack, the Polish Armed Forces Operational Command wrote in an X post. Russia's bigger army has also launched a new drive to punch through parts of the 1,000-kilometer (620-mile) front line, where short-handed Ukrainian forces are under heavy strain. Trump says the US must send more weapons to Ukraine U.S. President Donald Trump said Tuesday that he was 'not happy' with Russian President Vladimir Putin, who hasn't budged from his ceasefire and peace demands since Trump took office in January and began to push for a settlement. Trump said Monday that the U.S. would have to send more weapons to Ukraine, just days after Washington paused critical weapons deliveries to Kyiv. Kremlin spokesman Dmitry Peskov said Trump 'has quite a tough style in terms of the phrasing he uses,' adding that Moscow hopes to 'continue our dialogue with Washington and our course aimed at repairing the badly damaged bilateral ties.' Zelenskyy, meanwhile, urged Ukraine's partners to impose stricter sanctions on Russian oil and those who help finance the Kremlin's war by buying it. 'Everyone who wants peace must act,' Zelenskyy said. The Ukrainian leader met Pope Leo XIV on Wednesday during a visit to Italy ahead of an international conference on rebuilding Ukraine. Both Russia and Ukraine look to build more drones Ukraine's air defenses shot down 296 drones and seven missiles during the overnight attack, while 415 more drones were lost from radars or jammed, an air force statement said. Ukrainian interceptor drones, developed to counter the Shahed ones fired by Russia, are increasingly effective, Zelenskyy said, adding that domestic production of anti-aircraft drones is being scaled up in partnership with some Western countries. Western military analysts say Russia is also boosting its drone manufacturing and could soon be capable of launching 1,000 a night at Ukraine. 'Russia continues to expand its domestic drone production capacity amid the ever-growing role of tactical drones in front-line combat operations and Russia's increasingly large nightly long-range strike packages against Ukraine,' the Institute for the Study of War, a Washington-based think tank, said late Tuesday. Ukraine has also built up its own offensive drone threat, reaching deep into Russia with some long-range strikes. Russia's Defense Ministry said Wednesday that air defenses downed 86 Ukrainian drones over six Russian regions overnight, including the Moscow region. Flights were temporarily suspended at Moscow's Sheremetyevo airport and the international airport of Kaluga, south of Moscow. The governor of Russia's Kursk border region, Alexander Khinshtein, said a Ukrainian drone attack on the region's capital city just before midnight killed three people and wounded seven others, including the 5-year-old boy who died on the way to a hospital. Meanwhile, Europe's top human rights court ruled Wednesday that Russia had violated international law during the war in Ukraine, the first time an international court has found Moscow responsible for human rights abuses since the full-scale invasion in 2022. The court also ruled Russia was behind the downing of Malaysia Airlines Flight 17, the first time Moscow was named by an international court as being responsible for the 2014 tragedy that claimed 298 lives. Any decision is largely symbolic.

FBI And Microsoft Bust Massive North Korean Laptop Farm Scam Across US
FBI And Microsoft Bust Massive North Korean Laptop Farm Scam Across US

NDTV

time5 hours ago

  • NDTV

FBI And Microsoft Bust Massive North Korean Laptop Farm Scam Across US

In a major crackdown, Microsoft has suspended 3,000 Outlook and Hotmail accounts linked to North Korean IT workers involved in a global job fraud scheme. The company's Threat Intelligence team, calling the operation "Jasper Sleet," outlined its findings in a detailed post, revealing the scope of the elaborate scam. The US Department of Justice also joined the operation, seizing hundreds of laptops, 29 financial accounts, and shutting down nearly 24 websites. Authorities raided 29 "laptop farms" across the US, where Americans were helping foreign workers gain unauthorized access to remote jobs, according to the Fortune Magazine. These accomplices either installed remote access tools on company-issued laptops or shipped them to countries like Russia and China. Some Americans even rented out their identities to help North Koreans apply for US tech jobs. A Maryland nail salon worker was recently caught running a massive scheme, managing 13 remote IT jobs on behalf of North Korean workers. He pocketed nearly $1 million through this illicit activity. After pleading guilty to conspiracy to commit wire fraud, he's set to be sentenced in August. This case is part of a larger effort to crack down on North Korea's use of overseas tech jobs to fund its regime. According to the Microsoft Security, North Korea has deployed thousands of remote IT workers to assume jobs in software and web development as part of a revenue generation scheme for the North Korean government. These highly skilled workers are most often located in North Korea, China, and Russia, and use tools such as virtual private networks (VPNs) and remote monitoring and management (RMM) tools together with witting accomplices to conceal their locations and identities. Historically, North Korea's fraudulent remote worker scheme has focused on targeting United States (US) companies in the technology, critical manufacturing, and transportation sectors. However, we've observed North Korean remote workers evolving to broaden their scope to target various industries globally that offer technology-related roles. Since 2020, the US government and cybersecurity community have identified thousands of North Korean workers infiltrating companies across various industries. The North Korean IT worker scheme generates up to $600 million a year, according to UN estimates, and the IT workers share information with more malicious cyber attackers that have stolen billions in crypto. The revenue generated by the scheme and the illicitly heisted crypto are used to fund DPRK authoritarian ruler Kim Jong Un's nuclear weapons program, according to the FBI and the US Department of Justice.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store