Latest news with #MicrosoftExchange


Time of India
4 days ago
- Time of India
US arrests Chinese hacker Xu Zewei for stealing COVID-19 research and hacking Microsoft servers
Xu Zewei, a Chinese national, has been apprehended in Italy following a U.S. extradition request for his involvement in hacking activities. He is accused of stealing COVID-19 research from American universities and orchestrating a massive attack on Microsoft Exchange servers. These actions are linked to the Hafnium group, which has ties to the Chinese government. Tired of too many ads? Remove Ads Chinese hackers stole COVID research and attacked Microsoft servers Tired of too many ads? Remove Ads FAQs The U.S. Justice Department confirmed the arrest of Chinese national Xu Zewei , a suspected contract hacker for the Chinese government. Xu was arrested in Italy after the U.S. requested his extradition, according to the report by allegedly worked for a Chinese tech company called Shanghai Powerock Network, which helped China with hacking operations. Xu and another Chinese hacker named Zhang Yu, who is still on the run, were charged with 9 serious hacking crimes in the U.S, as stated by the U.S. says they stole sensitive COVID-19 research from American universities in February 2020, during the early pandemic. They are accused of cyber spying and data theft, which could have given China an edge in vaccine or treatment research, according to the report by and his group also carried out a massive hacking attack on Microsoft Exchange servers in March 2021. The hackers broke into over 60,000 email servers across the U.S., mostly run by small businesses, and stole private emails and contact info, as per the U.S. says the hackers are part of a Chinese hacking group called Hafnium, linked to Beijing. Hafnium later started a new cyberattack campaign called Silk Typhoon, known for targeting large companies and U.S. government agencies, according to the report by Zewei is a Chinese hacker arrested in Italy for stealing U.S. COVID-19 research and hacking Microsoft servers, as per U.S. Justice is a China-linked hacker group accused of major cyberattacks on U.S. companies and government email servers, including Microsoft Exchange.


Economic Times
4 days ago
- Economic Times
US arrests Chinese hacker Xu Zewei for stealing COVID-19 research and hacking Microsoft servers
Xu Zewei, a Chinese national, has been apprehended in Italy following a U.S. extradition request for his involvement in hacking activities. He is accused of stealing COVID-19 research from American universities and orchestrating a massive attack on Microsoft Exchange servers. These actions are linked to the Hafnium group, which has ties to the Chinese government. Tired of too many ads? Remove Ads Chinese hackers stole COVID research and attacked Microsoft servers Tired of too many ads? Remove Ads FAQs The U.S. Justice Department confirmed the arrest of Chinese national Xu Zewei , a suspected contract hacker for the Chinese government. Xu was arrested in Italy after the U.S. requested his extradition, according to the report by allegedly worked for a Chinese tech company called Shanghai Powerock Network, which helped China with hacking operations. Xu and another Chinese hacker named Zhang Yu, who is still on the run, were charged with 9 serious hacking crimes in the U.S, as stated by the U.S. says they stole sensitive COVID-19 research from American universities in February 2020, during the early pandemic. They are accused of cyber spying and data theft, which could have given China an edge in vaccine or treatment research, according to the report by and his group also carried out a massive hacking attack on Microsoft Exchange servers in March 2021. The hackers broke into over 60,000 email servers across the U.S., mostly run by small businesses, and stole private emails and contact info, as per the U.S. says the hackers are part of a Chinese hacking group called Hafnium, linked to Beijing. Hafnium later started a new cyberattack campaign called Silk Typhoon, known for targeting large companies and U.S. government agencies, according to the report by Zewei is a Chinese hacker arrested in Italy for stealing U.S. COVID-19 research and hacking Microsoft servers, as per U.S. Justice is a China-linked hacker group accused of major cyberattacks on U.S. companies and government email servers, including Microsoft Exchange.
&w=3840&q=100)

First Post
4 days ago
- First Post
Who is the Chinese hacker the US is accusing of stealing vaccine secrets?
A Chinese tech worker, Xu Zewei, was arrested in Milan at the request of the US for allegedly hacking American Covid-19 vaccine research during the pandemic. Tied to the Chinese state-linked Hafnium group, Xu now faces extradition, putting Italy in a diplomatic bind between Washington and Beijing read more A hooded man holds a laptop computer as blue screen with an exclamation mark is projected on him in this illustration picture taken on May 13, 2017. Representational Image/Reuters Italian authorities have arrested a Chinese citizen accused by the United States of playing a key role in a state-sponsored cyber espionage operation that allegedly targeted American vaccine research during the Covid-19 pandemic. The individual, 33-year-old Xu Zewei, was apprehended on July 3 at Milan Malpensa Airport shortly after arriving on a flight from Shanghai. The arrest, executed under an international warrant issued by the United States District Court for the Southern District of Texas, stems from allegations that Xu participated in a large-scale cyber campaign aimed at breaching sensitive American computer systems between February 2020 and June 2021. STORY CONTINUES BELOW THIS AD US prosecutors believe Xu was affiliated with the Hafnium group, a hacking collective linked to the Chinese state that has previously been accused of launching cyber intrusions into Microsoft Exchange servers and targeting government, research and health sector entities worldwide. How was Xu arrested? Xu's detention was carried out by Italian police around 11:00 am local time, as he landed in Milan from China. According to internal documentation from Italy's International Police Cooperation Service, the Chinese citizen is known to use the aliases 'Zavier Xu' and 'David Xu', and was flagged in advance by the US Embassy in Rome, which had alerted Italian law enforcement to his impending arrival. Upon arrest, Judge Veronica Tallarida of Milan's Fifth Criminal Appeal Division formally validated the action on July 4, citing Xu's lack of any connections to Italy and identifying a 'concrete risk of flight.' The judge ordered his preventive detention at Busto Arsizio prison, located in the province of Varese, and authorised the seizure of his mobile phone and electronic belongings for forensic examination. Xu, who reportedly has no prior criminal record or links to Italy, claimed to be an IT technician employed by GTA Semiconductor Co Ltd, and stated through his legal representation that he was visiting the country as a tourist. His lawyer, Enrico Giarda confirmed Xu's intention to oppose extradition to the United States. STORY CONTINUES BELOW THIS AD What are the allegations against Xu? The US indictment alleges that Xu was involved in a sophisticated hacking operation that aimed to infiltrate American institutions conducting vital coronavirus-related research at the height of the pandemic. According to materials filed by the FBI, Xu was part of a campaign that sought to access proprietary data from virologists, immunologists, and academic institutions, with a particular focus on the University of Texas — a major hub for Covid-19 vaccine development. The US Department of Justice, in its formal request for extradition, laid out several serious charges against Xu, including: Wire fraud Conspiracy to commit wire fraud Unauthorised access to protected computers Aggravated identity theft If found guilty, Xu could face a maximum sentence of 32 years in federal prison. Authorities claim the cyber operation went beyond health data, allegedly extending into attempts to acquire classified US policy-related information. The operation has been attributed to Hafnium, a group previously linked to Chinese state security apparatuses and also known by Microsoft as Silk Typhoon. The FBI believes this group was behind a broad 2020 cyber offensive that compromised thousands of systems globally, exploiting software vulnerabilities to obtain confidential data from public and private entities alike. Will Xu be extradited to the US? The Italian Ministry of Justice confirmed that a formal request for extradition from the US has been received, and the Milan Prosecutor General's Office is currently reviewing the documentation. According to a July 1 memorandum sent by the US Department of Justice to Italian counterparts, Washington warned of the risk of Xu fleeing custody if released on bail or placed under house arrest. The memo referenced a past high-profile incident involving Russian businessman Artem Uss, who escaped from Italian house arrest in 2023 after a court approved his extradition to the US. STORY CONTINUES BELOW THIS AD Uss reappeared shortly afterward in Russia, resulting in international embarrassment and criticism of Italy's judicial oversight. Another recent case also haunts Italy's extradition history: earlier this year, an Italian court revoked the arrest of an Iranian engineer wanted by the US for allegedly exporting sensitive high-tech goods to Tehran. The decision came days after the release of Italian journalist Cecilia Sala by Iran, raising concerns over so-called 'hostage diplomacy.' In light of these past experiences, the US has urged Italian officials to keep Xu in custody throughout the extradition process. Who will Italy choose - US or China? The arrest may test the delicate foreign policy posture adopted by Prime Minister Giorgia Meloni, who has consistently described the United States as Italy's foremost strategic ally. Meloni has cultivated a close relationship with US President Donald Trump and continues to prioritise transatlantic cooperation, even as Italy navigates its withdrawal from the Belt and Road Initiative, China's global infrastructure strategy spearheaded by President Xi Jinping. Nevertheless, Meloni has signaled that Italy remains interested in maintaining diplomatic ties with Beijing, and the current arrest risks triggering a backlash from Chinese authorities. The timing is particularly delicate, as Deputy Prime Minister Matteo Salvini is expected to visit China later this week on an official mission. STORY CONTINUES BELOW THIS AD Beijing has in the past responded harshly to accusations of state-backed cyber operations. In 2020, following the indictment of two other Chinese nationals by the US for similar attempts to access American coronavirus research, China's Global Times responded by asserting, 'It seems that some US politicians have totally lost their minds.' The paper dismissed the allegations as baseless and accused the US of seeking to 'dodge its own culpability and failures' during the pandemic. What happens next? Xu is scheduled to appear before the Milan Court of Appeal for formal identification and to state whether he consents to extradition. If, as expected, he contests the US request, the case could stretch over several weeks or longer. Italy's judicial authorities will evaluate the legal sufficiency of the US charges, as well as any political or humanitarian considerations that may arise during the proceedings. Meanwhile, the seized digital devices from Xu are being analysed as part of the broader investigation into the alleged cyber operations. The outcome of the extradition process will likely serve as a bellwether for future Italy-US-China legal interactions. With inputs from agencies With inputs from agencies
Yahoo
03-07-2025
- Business
- Yahoo
As Microsoft Exchange 2016 and 2019 sunset, how can privacy-conscious organisations future-proof their email?
With Microsoft Exchange Server 2016 and 2019 reaching end-of-support in October, IT teams must make an urgent, strategic decision of either migrating to cloud-based services or staying on-premises. As major productivity solution providers continue to adjust their plan offerings, many organisations are grappling with sudden shrinking plan options, rising costs, and the phase-out of long-standing services. With Microsoft Exchange Server 2016 and 2019 reaching end-of-support in October 2025, IT teams must consider more than just a routine upgrade. This is a strategic crossroads, a decision that impacts how businesses manage communication, compliance, and data sovereignty, with significant implications for cost and control. Continuing on unsupported Exchange versions would expose businesses to serious risks, including the loss of security updates, vendor support, and compatibility with other Microsoft applications. Therefore, this shift marks more than just the end of a product lifecycle. It forces IT teams to make an urgent, strategic decision of either migrating to cloud-based services like Exchange Online or Microsoft 365, or staying on-prem with the upcoming Exchange Server Subscription Edition. Time is running out to evaluate the next move before the sunset. With mounting pressure to act, IT teams are left with a narrow window to weigh their options. The new Exchange subscription model introduces added complexity, requiring Software Assurance on top of server licences and client access licences, which can create significant management challenges for growing teams and small to mid-sized organisations. Similarly, cloud adoption offers agility and scalability, but organisations are increasingly weighing the trade-offs in compliance, cost control, and vendor dependency. Software-as-a-service (SaaS) expenditures have grown 27% in two years, averaging US$7,900 ($10,049) per user annually, according to spend optimisation platform Vertice. For heavily regulated sectors or cost-conscious public institutions, this trend raises sustainability concerns. In this landscape, finding a stable on-premise solution that guarantees robust security, privacy and price reliability becomes all the more crucial. Hosting email on-premises allows organisations to retain full ownership over their infrastructure and data, reducing reliance on external vendors and ensuring compliance with local or sector-specific standards such as European Union's General Data Protection Regulation, US's Health Insurance Portability and Accountability Act or ISO 27001. This can be particularly beneficial for teams in education, government, legal, or healthcare environments, where trust and traceability matter. On-premises solutions can also offer key advantages in data governance. With everything hosted within the organisation's own network — from mail services and user permissions to backup and access logs — administrators maintain full visibility into how data is handled and by whom. This level of control is increasingly critical in an era where organisations face tightening compliance regulations and heightened data privacy expectations. Some modern solutions now integrate email, storage, security, and auditing into a single appliance, enabling IT teams to simplify administration while strengthening governance and oversight. In terms of budget, modern self-hosted platforms can also break from the pricing complexity of legacy email systems. For IT teams managing large-scale infrastructure, minimising unpredictable licensing costs and integrating with existing systems is critical. A solution like Synology MailPlus, which runs natively on network attached storage (NAS) devices and follows a lifetime licence model, addresses both these issues. Ultimately, organisations today are not just choosing where to host email. They are choosing how to control and protect one of their most sensitive communications systems. Whether responding to evolving compliance demands or planning for long-term IT resilience, on-prem email remains a smart and strategic option for organisations that want simplicity, ownership, and security on their own terms. Learn more about how Synology MailPlus supports email privacy, data governance, and cost reliability here: See Also: Click here to stay updated with the Latest Business & Investment News in Singapore New AWS innovation hub in Singapore to support the training of 2,000 professionals annually M1 targets Asean growth with a heavier focus on enterprise tech consulting Singapore taps on AI to detect fractures, tuberculosis and streamline public healthcare delivery Read more stories about where the money flows, and analysis of the biggest market stories from Singapore and around the World Get in-depth insights from our expert contributors, and dive into financial and economic trends Follow the market issue situation with our daily updates Or want more Lifestyle and Passion stories? Click hereError in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

Miami Herald
22-05-2025
- Politics
- Miami Herald
Russian Intelligence Attack on NATO ‘Logistics and Technology' Exposed
Russia's military intelligence is targeting logistics operations in NATO countries which help Ukraine, according to the UK's National Cyber Security Centre (NSCS). The NSCS, part of the U.K's GCHQ (Government Communications Headquarters) said that Russia's GRU Unit 26165 is trying to penetrate networks across defense and transport systems both in Ukraine and in several of its allies. Newsweek has contacted the Russian defense ministry for comment. Western leaders have raised the alarm over the cyber warfare that Russian hacker groups have engaged in since the start of Moscow' full-scale invasion of Ukraine. These include accusations that Russia has conducted cyberattacks against Ukraine and on civilian infrastructure in Europe, and interfered in foreign elections. The NSCS report will reinforce these concerns. The NSCS said the U.K. government and its allies had exposed a campaign of "malicious cyber activity" carried out by Russia's GRU military intelligence unit 26165, also known as APT 28, against western logistics entities and technology companies. The unit, also known as 'Fancy Bear,' has raise the alarm among NATO allies with France accusing the unit in April of carrying out cyberattacks against its government ministries. The U.K. and partners from ten countries found that it had conducted the operations against both public and private organizations since 2022, the NSCS said in its press release. These included organizations across the defense sector, IT services, maritime, airports, ports and air traffic management systems and other sectors which help deliver support to Ukraine. The GRU unit's activity included credential guessing, spear-phishing and exploiting Microsoft Exchange mailbox permissions. Russian intelligence also targeted internet-connected cameras at Ukrainian border crossings and near military installations. The countries apart from Ukraine which were targeted were Bulgaria, the Czech Republic, France, Germany, Greece, Italy, Moldova, the Netherlands, Poland, Romania, Slovakia and the U.S. No specific organizations were named and there was no information about whether the unit managed to obtain classified information. The NCSC called on leaders at technology and logistics firms to recognize the elevated cyber threat and take immediate action to protect themselves. Paul Chichester, NCSC Director of Operations: "This malicious campaign by Russia's military intelligence service presents a serious risk to targeted organizations, including those involved in the delivery of assistance to Ukraine." Atlantic Council report released May 20: "American and Western policymakers must size up the threat, unpack the complexity of Russia's cyber web, and invest in the right proactive measures to enhance their security and resilience." A report by the Atlantic Council released Tuesday concluded that Russia is a persistent and well-resourced cyber threat to the United States and its allies and partners, and the threat Moscow poses will continue to emerge in future. Related Articles Marco Rubio Refuses To Call Putin 'War Criminal', After Grilling Rex TillersonUS and Russia Flex Military Muscles on Same StageNATO Shows Force on Northern Flank with Russia as US Pulls BackUS Launches Nuclear-Capable Missile in Arms Race With Russia and China 2025 NEWSWEEK DIGITAL LLC.