News Alert: What You Need to Know about Chinese Hackers APT 10 (& Your IT Security)

News Alert What You Need to Know blog post e1551079885626

One of the persistent threats out there for companies is hackers that try to attack and infiltrate their networks. Thanks to the internet, the world is just a keystroke away, which is great for reaching more clients in other countries, but it also means having to protect your IT infrastructure against hackers from anywhere on the planet.

At Neuron Computers, we’re so serious about cybersecurity that we created a 21-Point Cyber Security Audit. We feel it’s our responsibility to keep our clients informed of any new developments in the cyber world that could have an impact on their business.

A malicious hacking group that’s been one of the most damaging for U.S. businesses and in the news of late is APT 10.  APT is an acronym for Advanced Persistent Threat, which unfortunately fits their group perfectly.

In December 2018, two members of APT 10 were indicted by a grand jury in the U.S. District Court for the Southern District of New York on charges of conspiracy to commit computer intrusion (aka hacking), wire fraud, and aggravated identity theft. They basically have been hacking into major U.S. organizations, like NASA, and multiple U.S. companies since 2006.

Untitled1 neuron

So why is APT wanted by the FBI and how can you ensure you’re protected from these high-profile hackers? We’ll tell you everything you need to know next!

Why are these Chinese Hackers so Dangerous to Businesses?

When a cybercriminal has managed to breach your system, there are a number of things they can do once inside:

  • Steal confidential corporate data
  • Steal personal information (like employee SSNs)
  • Plant spyware to record logins to things like bank accounts
  • Infect your system with a virus
  • Use ransomware to scramble your data and request a ransom to make it usable
  • Gain control over your computer and use it in coordinated botnet attacks

One of the victims of APT 10 was the U.S. Navy. After hacking into their system APT 10 stole the personally identifiable information of over 100,000 Navy personnel, leaving all at risk of identity theft.

To illegally infiltrate the networks of more than 45 commercial and defense technology companies in at least 12 states, APT 10 also targeted managed service providers (MSPs) due to the access they had to other company systems while performing IT work.

Because Neuron Computers places such a strong emphasis on IT security, not only for our clients but also ourselves, our systems have been safe from any attacks.

APT 10 Hacking Targets

The targets of this virtual criminal organization cross many different industries, here are a few of those they’ve targeted:

  • Defense/Government
  • Aviation
  • Satellite & Maritime Technology
  • Industrial Factory Automation
  • Automotive
  • Laboratories
  • Banking & Finance
  • Telecommunications
  • Consumer Electronics
  • Managed Service Providers
  • Computer & Information Technology

One other thing you need to know is that APT 10 is associated with the Chinese government and gave that government’s intelligence service access to the sensitive business information they stole from U.S. companies.

6 Things You Can Do to Protect Your Company from Hackers

During the first half of 2018, there were 668 recorded data breaches in the United States, exposing over 22 million records. But while hackers are lurking around every virtual corner, that doesn’t mean you have to become a victim of a cyberattack.

Here are six ways you can protect yourself and your company from malicious hacks and data breaches.

Secure Your Computers & Mobile Devices

Using a next-gen firewall, anti-virus/malware, and network protections are your first line of defense against hackers trying to breach your network. Many companies do fine protecting their computers, but forget about mobile devices, which are being used to access corporate data more often.

Train Your Team About Phishing

Emails disguised as legitimate that hold a malicious link or attachment are still the number one method of breaching a network. Ensure your employees receive regular anti-phishing email training.

Use Multi-Factor Authentication

Login credentials are like gold for cybercriminals and you can protect yours even if they are stolen by using multi-factor authentication for your logins, which required a time-sensitive code to be entered along with your name and password.

Have a Reliable Backup & Recovery System

Simply having a backup of all your data thwarts ransomware attacks. A cloud-based or off-site backup and recovery system also protects your company in the event of a disaster that impacts your offices, like a flood, hurricane, or fire.

Use Good Administrative and Password Management

Using strong passwords is important, but your password management shouldn’t stop there. Use applications that allow user-based permissions to access certain company assets and change passwords regularly.

Get a Security Audit from a Trusted Professional

It’s often hard for you to know every vulnerability in your IT security. It’s a good idea to get a security audit from a trusted professional (like Neuron Computers!) that will help you identify and address any weak spots in your overall cybersecurity plan.

Schedule a Free 21-Point Cyber Security Audit Today!

Don’t wait until you’re the victim of a cyberattack to beef up your network security. Neuron Computers offers no-risk, free assessments that review 21 different aspects of network and IT security.

Signup online today or call 1-833-4-NEURON