
A sophisticated cyber-espionage campaign attributed to suspected Chinese hackers has been uncovered, focusing on American technology companies and law firms. This ongoing operation has reportedly been stealing sensitive national security information while often remaining undetected, according to insights from Google. Tracked by Google under the codename UNC5221, this hacking group has emerged as a significant threat in the United States over recent years. Charles Carmakal, chief technology officer at Google Cloud's Mandiant consulting division, described them as the "most prevalent adversary" due to the frequency, severity, and complexity of their attacks. Researchers have noted that these hackers are remarkably advanced and operate with remarkable stealth. On average, they linger undetected within their targets' networks for more than a year, continually exfiltrating sensitive information related to national security and international trade. Austin Larsen, a principal analyst at Google’s Threat Intelligence Group, emphasized the high activity level of these cybercriminals, indicating that numerous organizations are likely compromised without their knowledge. Although Google has not disclosed specific victims of this hacking campaign, the implications of these actions extend beyond individual companies. The Chinese Embassy in Washington, D.C. has not responded to requests for comment regarding the allegations. This latest activity is part of a broader pattern of increasing cyber threats linked to China, which has seen American officials attributing similar state-sponsored attacks to groups such as Salt Typhoon and Volt Typhoon, known for targeting U.S. telecommunications and critical infrastructure. Experts believe that the ultimate aim of these attackers is to gather intelligence and establish footholds in crucial systems, potentially preparing for future conflicts. Additionally, the investigation has revealed that these hackers are focusing on American legal firms, specifically searching emails of certain individuals in efforts to gather insights on international trade. The group has also been implicated in stealing source code from major U.S. technology developers, furthering their capacity for espionage. John Hultquist, chief analyst at Google’s Threat Intelligence Group, explained that obtaining this source code allows hackers to create exploits, essentially giving them a "skeleton key" to manipulate the technology at will.
The Unique Identification Authority of India (UIDAI) has unveiled an upgraded version of the Aadhaar app, featuring a ra...
Business Today | Jan 28, 2026, 12:30
In the realm of space exploration, the potential for rocket failure is an ever-present reality. Over the years, I have c...
Ars Technica | Jan 28, 2026, 12:20
Dario Amodei, the CEO of Anthropic, has issued a stark warning to major players in the AI sector regarding the growing p...
Business Insider | Jan 28, 2026, 10:00SK Hynix, the renowned South Korean memory manufacturer, made headlines on Wednesday with its announcement to establish ...
CNBC | Jan 28, 2026, 10:20
Chinese humanoid robots are gearing up to make their debut in the U.S. market, potentially ahead of Tesla's much-anticip...
CNBC | Jan 28, 2026, 07:55