#### [CSO](/security/cso/)**16** Infosec experts fear China could retaliate against tariffs with a Typhoon attack================================================================================**16** Scammers are already cashing in with fake invoices for import costs——————————————————————-[Jessica Lyons](/Author/Jessica-Lyons ‘Read more by this author’) Thu 10 Apr 2025 // 11:00 UTC [](https://www.reddit.com/submit?url=https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=Infosec%20experts%20fear%20China%20could%20retaliate%20against%20tariffs%20with%20a%20Typhoon%20attack) [](https://twitter.com/intent/tweet?text=Infosec%20experts%20fear%20China%20could%20retaliate%20against%20tariffs%20with%20a%20Typhoon%20attack&url=https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=Infosec%20experts%20fear%20China%20could%20retaliate%20against%20tariffs%20with%20a%20Typhoon%20attack&summary=Scammers%20are%20already%20cashing%20in%20with%20fake%20invoices%20for%20import%20costs) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) World War Fee As the trade war between America and China escalates, some infosec and policy experts fear Beijing will strike back in cyberspace.Shortly after the US tariff on imported Chinese goods increased to 104 percent on Wednesday, China boosted its duty on American imports to 84 percent.’China urges the US to immediately correct its wrong practices, cancel all unilateral tariff measures against China, and properly resolve differences with China through equal dialogue on the basis of mutual respect,’ the Office of the Tariff Commission of the State Council said in a [statement](https://gss.mof.gov.cn/gzdt/zhengcejiedu/202504/t20250409_3961685.htm). US President Trump, citing a ‘[lack of respect](https://truthsocial.com/@realDonaldTrump/posts/114309144289505174)’ from Beijing, hiked the China tariff yet again, this time increasing it to [125 percent](https://www.theregister.com/2025/04/09/eu_tariffs/). The administration later ‘[paused](https://www.theregister.com/2025/04/09/eu_tariffs/?td=rt-3a)’ retaliatory levies on many other countries, though it kept the 125 percent tariff on China.’When you punch at the United States of America, President Trump is going to punch back further,’ White House press secretary Karoline Leavitt [told reporters](https://apnews.com/article/china-response-us-tariffs-104-d40d497f6e07ee4163d88443cb75ab3f). While this back and forth is poised to destroy trade between the two nations — and skyrocket consumer prices or cut off supplies entirely — there is a growing concern President Xi Jinping might call in his [army of cyber-spies](https://www.theregister.com/2023/05/01/fbi_director_wray_china_testimony/) to support the People’s Republic.’China will retaliate with systemic cyber attacks as tensions simmer over,’ cybersecurity advisor Tom Kellermann told *The Register*. ‘The typhoon campaigns have given them a robust foothold within critical infrastructure that will be used to launch destructive attacks. Trade wars were a historical instrument of soft power. Cyber is and will be the modern instrument of choice.’> Trade wars were a historical instrument of soft power. Cyber is and will be the modern instrument of choiceThe ‘typhoon campaigns’ refer to a series of Chinese government-backed digital intrusions that came to light last year. These include Salt Typhoon, an espionage team that broke into at least [nine US telecommunications](https://www.theregister.com/2025/01/06/charter_consolidated_windstream_salt_typhoon/) companies and [government networks](https://www.theregister.com/2025/01/15/salt_typhoon_us_govt_networks/), and [Volt Typhoon](https://www.theregister.com/2024/01/30/fbi_china_volt/), which has been [burrowing](https://www.theregister.com/2025/03/12/volt_tyhoon_experience_interview_with_gm/) into America’s critical infrastructure since at least 2023 and [readying destructive cyberattacks](https://www.theregister.com/2024/02/07/us_chinas_volt_typhoon_attacks/) against those targets.’To the extent that China is holding back on conducting certain types of cyberattacks, it may feel less restrained now,’ said Annie Fixler, director of the Center on Cyber and Technology Innovation at that Foundation for Defense of Democracies.’The intelligence community has assessed that China has conducted operational preparation of the battlefield to disrupt US critical infrastructure and cause societal panic, impede US government decision making, and degrade our ability to mobilize forces,’ Fixler told *The Register*.’China is unlikely to activate these capabilities right now as Beijing is holding them in reserve for a Taiwan crisis. But China has in essence pre-set bombs across U.S. critical infrastructure, so what more could they want?’While it remains to be seen what, if anything, Beijing-backed goons plan to do in cyberspace to push back against Trump’s tariffs — in addition to [spying](https://www.theregister.com/2025/03/06/fbi_china_pays_75k_per/), of course, which never really goes away — financially motivated cybercriminals have already found ways to exploit people’s confusion around the constantly in-flux trade rules.### Digital fraudsters cash in’We definitely have seen this ramping up in the last few weeks,’ Luigi Lenguito, CEO of BforeAI, told *The Register*.His company uses artificial intelligence to predict whether a web domain will be malicious before it is used to launch an attack, and in the first three months of 2025 [tracked 301](https://bfore.ai/imported-risk-cybercriminals-exploit-tariff-uncertainty/) tariff-related malicious domain registrations.’This was not unexpected,’ Lenguito said, noting that Trump has been talking about tariffs even before he was elected. Cybercriminals were paying attention, and ‘they were preparing this infrastructure weeks ago.’Tariff-related fraud tends to fall into three buckets, he noted. The first is a new spin on the DHL phishing scam, where the recipient receives an email or text message claiming to be from DHL or another shipping company like FedEx or UPS. The message says the individual has a package waiting for pickup. ‘But to release it, you have to pay the tariff,’ Lenguito explained.The scam then directs the recipient to a phony website and prompts them to enter their personal and payment information, which is then recorded by the crooks to use for fraud.’This has always existed, especially abroad, but we’ve seen an extreme peak here in the US,’ Lenguito said. ‘Normally you would have maybe a few hundred of these every week. Now you’re looking at tens of thousands.’* [Trump thinks we can make iPhones in the US just like China. Yeah, right](https://www.theregister.com/2025/04/09/iphones_manufacture_unlikely_in_us/)* [EU lands 25% counter tariff punch on US, Trump pauses broad import levy hike — China excepted](https://www.theregister.com/2025/04/09/eu_tariffs/)* [This is the FBI, open up. China’s Volt Typhoon is on your network](https://www.theregister.com/2025/03/12/volt_tyhoon_experience_interview_with_gm/)* [As CISA braces for more cuts, threat intel sharing takes a hit](https://www.theregister.com/2025/04/08/cisa_cuts_threat_intel/)Criminals are also capitalizing on [invoice fraud](https://www.theregister.com/2024/08/26/31m_invoices_business_files_exposed/), and using this type of scam to target small- and mid-sized businesses. The firms receive a customised invoice purporting to come from a supplier they use with references to new import fees that changed as the goods were being shipped.’The novelty here is that historically, you would see this type of fraud using standardized content, so maybe the same fake PDF of an invoice sent to multiple potential victims,’ Lenguito said. ‘But in this case, each potential victim is receiving a dedicated, customized PDF, and that tells us that the criminal is probably using generative AI tooling.’The third category of scam, ‘and the most frightening,’ combines digital fraud and in-person social engineering, according to Lenguito.’Let’s say that you received a package from FedEx yesterday,’ he explained. ‘Today someone shows up at your home saying, ‘Yesterday, we delivered this package. We forgot to ask you to pay the tariff, here’s the receipt, I need you to pay me.”BforeAI suspects the criminals behind this attempt are using info-stealing malware or some type of spyware running on a victim’s computer to alert the crooks that a package has been delivered to the recipient’s address. Or, frankly, any other way to quietly monitor their web activities for evidence of package deliveries.’Unfortunately, these are very, very credible and very, very well done,’ Lenguito said. ‘So it’s very easy to fall prey to these scams.’ ® [Sponsored: Don’t let cyberattacks keep you down](https://go.theregister.com/tl/3147/shttps://www.theregister.com/2025/04/02/dont_let_cyberattacks_keep_you/) Share [](https://www.reddit.com/submit?url=https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=Infosec%20experts%20fear%20China%20could%20retaliate%20against%20tariffs%20with%20a%20Typhoon%20attack) [](https://twitter.com/intent/tweet?text=Infosec%20experts%20fear%20China%20could%20retaliate%20against%20tariffs%20with%20a%20Typhoon%20attack&url=https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=Infosec%20experts%20fear%20China%20could%20retaliate%20against%20tariffs%20with%20a%20Typhoon%20attack&summary=Scammers%20are%20already%20cashing%20in%20with%20fake%20invoices%20for%20import%20costs) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) #### More about* [China](/Tag/China/)* [Cybercrime](/Tag/Cybercrime/)* [Security](/Tag/Security/) More like these × ### More about* [China](/Tag/China/)* [Cybercrime](/Tag/Cybercrime/)* [Security](/Tag/Security/)* [Tax](/Tag/Tax/)* [United States of America](/Tag/United%20States%20of%20America/) ### Narrower topics* [2FA](/Tag/2FA/)* [Advanced persistent threat](/Tag/Advanced%20persistent%20threat/)* [Alabama](/Tag/Alabama/)* [Application Delivery Controller](/Tag/Application%20Delivery%20Controller/)* [Authentication](/Tag/Authentication/)* [BEC](/Tag/BEC/)* [Black Hat](/Tag/Black%20Hat/)* [BSides](/Tag/BSides/)* [Bug Bounty](/Tag/Bug%20Bounty/)* [California](/Tag/California/)* [Central Intelligence Agency](/Tag/Central%20Intelligence%20Agency/)* [CHERI](/Tag/CHERI/)* [China Mobile](/Tag/China%20Mobile/)* [China telecom](/Tag/China%20telecom/)* [China Unicom](/Tag/China%20Unicom/)* [CISO](/Tag/CISO/)* [Common Vulnerability Scoring System](/Tag/Common%20Vulnerability%20Scoring%20System/)* [Cybersecurity](/Tag/Cybersecurity/)* [Cybersecurity and Infrastructure Security Agency](/Tag/Cybersecurity%20and%20Infrastructure%20Security%20Agency/)* [Cybersecurity Information Sharing Act](/Tag/Cybersecurity%20Information%20Sharing%20Act/)* [Cyberspace Administration of China](/Tag/Cyberspace%20Administration%20of%20China/)* [Data Breach](/Tag/Data%20Breach/)* [Data Protection](/Tag/Data%20Protection/)* [Data Theft](/Tag/Data%20Theft/)* [DDoS](/Tag/DDoS/)* [DEF CON](/Tag/DEF%20CON/)* [Digital certificate](/Tag/Digital%20certificate/)* [Digital Services Tax](/Tag/Digital%20Services%20Tax/)* [DOGE](/Tag/DOGE/)* [Encryption](/Tag/Encryption/)* [Exploit](/Tag/Exploit/)* [Federal government of the United States](/Tag/Federal%20government%20of%20the%20United%20States/)* [Firewall](/Tag/Firewall/)* [Five Eyes](/Tag/Five%20Eyes/)* [Foreign Intelligence Surveillance Act](/Tag/Foreign%20Intelligence%20Surveillance%20Act/)* [Great Firewall](/Tag/Great%20Firewall/)* [Hacker](/Tag/Hacker/)* [Hacking](/Tag/Hacking/)* [Hacktivism](/Tag/Hacktivism/)* [Hong Kong](/Tag/Hong%20Kong/)* [Identity Theft](/Tag/Identity%20Theft/)* [Incident response](/Tag/Incident%20response/)* [Information Technology and the People’s Republic of China](/Tag/Information%20Technology%20and%20the%20People%27s%20Republic%20of%20China/)* [Infosec](/Tag/Infosec/)* [Infrastructure Security](/Tag/Infrastructure%20Security/)* [IR35](/Tag/IR35/)* [JD.com](/Tag/JD.com/)* [Kenna Security](/Tag/Kenna%20Security/)* [NCSAM](/Tag/NCSAM/)* [NCSC](/Tag/NCSC/)* [New Mexico](/Tag/New%20Mexico/)* [New York](/Tag/New%20York/)* [Palo Alto Networks](/Tag/Palo%20Alto%20Networks/)* [Password](/Tag/Password/)* [Phishing](/Tag/Phishing/)* [Quantum key distribution](/Tag/Quantum%20key%20distribution/)* [Ransomware](/Tag/Ransomware/)* [Remote Access Trojan](/Tag/Remote%20Access%20Trojan/)* [REvil](/Tag/REvil/)* [RSA Conference](/Tag/RSA%20Conference/)* [Semiconductor Manufacturing International Corporation](/Tag/Semiconductor%20Manufacturing%20International%20Corporation/)* [Shenzhen](/Tag/Shenzhen/)* [Spamming](/Tag/Spamming/)* [Spyware](/Tag/Spyware/)* [Surveillance](/Tag/Surveillance/)* [TLS](/Tag/TLS/)* [Trojan](/Tag/Trojan/)* [Trusted Platform Module](/Tag/Trusted%20Platform%20Module/)* [Umbrella Firm](/Tag/Umbrella%20Firm/)* [United States Armed Forces](/Tag/United%20States%20Armed%20Forces/)* [United States Department of Commerce](/Tag/United%20States%20Department%20of%20Commerce/)* [US Treasury](/Tag/US%20Treasury/)* [Uyghur Muslims](/Tag/Uyghur%20Muslims/)* [Virginia](/Tag/Virginia/)* [Vulnerability](/Tag/Vulnerability/)* [Wannacry](/Tag/Wannacry/)* [Zero trust](/Tag/Zero%20trust/) ### Broader topics* [APAC](/Tag/APAC/) #### More aboutShare [](https://www.reddit.com/submit?url=https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=Infosec%20experts%20fear%20China%20could%20retaliate%20against%20tariffs%20with%20a%20Typhoon%20attack) [](https://twitter.com/intent/tweet?text=Infosec%20experts%20fear%20China%20could%20retaliate%20against%20tariffs%20with%20a%20Typhoon%20attack&url=https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=Infosec%20experts%20fear%20China%20could%20retaliate%20against%20tariffs%20with%20a%20Typhoon%20attack&summary=Scammers%20are%20already%20cashing%20in%20with%20fake%20invoices%20for%20import%20costs) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) **16** COMMENTS #### More about* [China](/Tag/China/)* [Cybercrime](/Tag/Cybercrime/)* [Security](/Tag/Security/) More like these × ### More about* [China](/Tag/China/)* [Cybercrime](/Tag/Cybercrime/)* [Security](/Tag/Security/)* [Tax](/Tag/Tax/)* [United States of America](/Tag/United%20States%20of%20America/) ### Narrower topics* [2FA](/Tag/2FA/)* [Advanced persistent threat](/Tag/Advanced%20persistent%20threat/)* [Alabama](/Tag/Alabama/)* [Application Delivery Controller](/Tag/Application%20Delivery%20Controller/)* [Authentication](/Tag/Authentication/)* [BEC](/Tag/BEC/)* [Black Hat](/Tag/Black%20Hat/)* [BSides](/Tag/BSides/)* [Bug Bounty](/Tag/Bug%20Bounty/)* [California](/Tag/California/)* [Central Intelligence Agency](/Tag/Central%20Intelligence%20Agency/)* [CHERI](/Tag/CHERI/)* [China Mobile](/Tag/China%20Mobile/)* [China telecom](/Tag/China%20telecom/)* [China Unicom](/Tag/China%20Unicom/)* [CISO](/Tag/CISO/)* [Common Vulnerability Scoring System](/Tag/Common%20Vulnerability%20Scoring%20System/)* [Cybersecurity](/Tag/Cybersecurity/)* [Cybersecurity and Infrastructure Security Agency](/Tag/Cybersecurity%20and%20Infrastructure%20Security%20Agency/)* [Cybersecurity Information Sharing Act](/Tag/Cybersecurity%20Information%20Sharing%20Act/)* [Cyberspace Administration of China](/Tag/Cyberspace%20Administration%20of%20China/)* [Data Breach](/Tag/Data%20Breach/)* [Data Protection](/Tag/Data%20Protection/)* [Data Theft](/Tag/Data%20Theft/)* [DDoS](/Tag/DDoS/)* [DEF CON](/Tag/DEF%20CON/)* [Digital certificate](/Tag/Digital%20certificate/)* [Digital Services Tax](/Tag/Digital%20Services%20Tax/)* [DOGE](/Tag/DOGE/)* [Encryption](/Tag/Encryption/)* [Exploit](/Tag/Exploit/)* [Federal government of the United States](/Tag/Federal%20government%20of%20the%20United%20States/)* [Firewall](/Tag/Firewall/)* [Five Eyes](/Tag/Five%20Eyes/)* [Foreign Intelligence Surveillance Act](/Tag/Foreign%20Intelligence%20Surveillance%20Act/)* [Great Firewall](/Tag/Great%20Firewall/)* [Hacker](/Tag/Hacker/)* [Hacking](/Tag/Hacking/)* [Hacktivism](/Tag/Hacktivism/)* [Hong Kong](/Tag/Hong%20Kong/)* [Identity Theft](/Tag/Identity%20Theft/)* [Incident response](/Tag/Incident%20response/)* [Information Technology and the People’s Republic of China](/Tag/Information%20Technology%20and%20the%20People%27s%20Republic%20of%20China/)* [Infosec](/Tag/Infosec/)* [Infrastructure Security](/Tag/Infrastructure%20Security/)* [IR35](/Tag/IR35/)* [JD.com](/Tag/JD.com/)* [Kenna Security](/Tag/Kenna%20Security/)* [NCSAM](/Tag/NCSAM/)* [NCSC](/Tag/NCSC/)* [New Mexico](/Tag/New%20Mexico/)* [New York](/Tag/New%20York/)* [Palo Alto Networks](/Tag/Palo%20Alto%20Networks/)* [Password](/Tag/Password/)* [Phishing](/Tag/Phishing/)* [Quantum key distribution](/Tag/Quantum%20key%20distribution/)* [Ransomware](/Tag/Ransomware/)* [Remote Access Trojan](/Tag/Remote%20Access%20Trojan/)* [REvil](/Tag/REvil/)* [RSA Conference](/Tag/RSA%20Conference/)* [Semiconductor Manufacturing International Corporation](/Tag/Semiconductor%20Manufacturing%20International%20Corporation/)* [Shenzhen](/Tag/Shenzhen/)* [Spamming](/Tag/Spamming/)* [Spyware](/Tag/Spyware/)* [Surveillance](/Tag/Surveillance/)* [TLS](/Tag/TLS/)* [Trojan](/Tag/Trojan/)* [Trusted Platform Module](/Tag/Trusted%20Platform%20Module/)* [Umbrella Firm](/Tag/Umbrella%20Firm/)* [United States Armed Forces](/Tag/United%20States%20Armed%20Forces/)* [United States Department of Commerce](/Tag/United%20States%20Department%20of%20Commerce/)* [US Treasury](/Tag/US%20Treasury/)* [Uyghur Muslims](/Tag/Uyghur%20Muslims/)* [Virginia](/Tag/Virginia/)* [Vulnerability](/Tag/Vulnerability/)* [Wannacry](/Tag/Wannacry/)* [Zero trust](/Tag/Zero%20trust/) ### Broader topics* [APAC](/Tag/APAC/) #### TIP US OFF[Send us news](https://www.theregister.com/Profile/contact/)[#### Google’s got a hot cloud infosec startup, a new unified platform — and its eye on Microsoft’s $20B+ security bizCloud Next How Chocolate Factory hopes to double down on enterprise-secCSO1 day -| 6](/2025/04/09/google_enterprise_security_ambitions/?td=keepreading) [#### Asian tech players react to US tariffs with delays, doubts, deal-makingAsia In Brief PLUS: Qualcomm acquires Vietnamese AI outfit; China claims US hacked winter games; India’s browser challenge winner disputed; and morePublic Sector4 days -| 11](/2025/04/07/asia_tech_news_in_brief/?td=keepreading) [#### Trump doubles down, vows to make Chinese imports even more expensive for AmericansWorld War Fee President to up tariffs on Middle Kingdom goods to 104% from 54%Public Sector3 days -| 230](/2025/04/07/trump_china_tariffs/?td=keepreading) [#### Building a better digital future for SMEsHow smaller businesses can grab the opportunities that AI and advanced collaboration and connectivity tools give themSponsored Feature](/2025/03/26/building_a_better_digital_future/?td=keepreading) [#### Top cybersecurity boffin, wife vanish as FBI raids homesUpdated Indiana Uni rm -rf online profiles while agents haul boxes of evidenceResearch10 days -| 21](/2025/03/31/indiana_cybersecurity_professor_fbi/?td=keepreading) [#### China hits back at America with retaliatory tariffs, export controls on rare earth mineralsWorld War Fee Shock and ore, 北京-styleOn-Prem6 days -| 127](/2025/04/04/china_hits_back_at_trump/?td=keepreading) [#### China’s FamousSparrow flies back into action, breaches US org after years off the radarCrew also cooked up two fresh SparrowDoor backdoor variants, says ESETNetworks14 days -| 2](/2025/03/27/china_famoussparrow_back/?td=keepreading) [#### As CISA braces for more cuts, threat intel sharing takes a hitAnalysis How will ‘gutting’ civilian defense agency make American cybersecurity great again?Public Sector3 days -| 10](/2025/04/08/cisa_cuts_threat_intel/?td=keepreading) [#### Americans set to pay more on all imports: Trump activates blanket tariffsWorld War Fee Tech slugged with higher duties, broad base 10% hike, semiconductors avoid retaliatory levies for nowOn-Prem8 days -| 584](/2025/04/02/us_tariffs_liberation_day_announcement/?td=keepreading) [#### Ransomware crews add ‘EDR killers’ to their arsenal — and some aren’t even malwareinterview Crims are disabling security tools early in attacks, Talos saysDisaster Recovery Week10 days -| 1](/2025/03/31/ransomware_crews_edr_killers/?td=keepreading) [#### Suspected Chinese spies right now hijacking buggy Ivanti gear — for third time in 3 yearsSimple denial-of-service blunder turned out to be remote unauth code exec disasterCyber-crime7 days -| 3](/2025/04/03/suspected_chines_snoops_hijacked_buggy/?td=keepreading) [#### Someone compromised US bank watchdog to access sensitive financial filesOCC mum on who broke into email, but Treasury fingered China in similar hack months agoCyber-crime22 hrs -| 2](/2025/04/09/occ_bank_email_hack/?td=keepreading)
Related Tags:
NAICS: 923 – Administration Of Human Resource Programs
NAICS: 92 – Public Administration
NAICS: 922 – Justice
Public Order
Safety Activities
NAICS: 928 – National Security And International Affairs
Sodinokibi
REvil
Sodin
WanaCrypt0r
WanaCrypt
Associated Indicators:


