
A Chinese threat actor is targeting Foreign Affairs ministries and embassies in Europe, research shows.
Cyber threat intelligence researchers at Check Point Research (CPR) have identified a trend of attacks by Chinese hackers. They appear to have shifted their attention to European governmental authorities, mostly in Eastern Europe.
The cyberattack campaign, known as SmugX, has been active since at least December 2022. There’s a strong likelihood that it’s an extension of a prior campaign carried out by Chinese threat actors RedDelta and Mustang Panda.

Most of the infected .docx and .pdf files used in the attack contained diplomatic content. Researchers got hold of a letter from the Serbian embassy in Budapest, a document stating the priorities of the Swedish Presidency of the Council of the European Union, an invitation to a diplomatic conference issued by Hungary’s Ministry of Foreign Affairs, and an article about two Chinese human rights lawyers sentenced to more than a decade in prison.

Threat actors utilized the HTML Smuggling technique, which is used by hackers to trick web security systems and bypass their defenses. It involves hiding malicious code within seemingly harmless HTML tags or elements.
More from Cybernews:
Decentralized storage: an answer to cloud-based security breaches?
Twitter blocks non-users from reading tweets over AI data scraping
Ukrainian banks hit by pro-Russian NoName hackers
Apple market value tops $3 trillion again
Google says it will block news in Canada
Subscribe to our newsletter
Your email address will not be published. Required fields are marked