    <?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hacking Archives - Exchange NFT &amp; CRYPTO</title>
	<atom:link href="https://xnftcrypto.com/tag/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://xnftcrypto.com/tag/hacking/</link>
	<description>Find Latest Articles on  Crypto, Blockchain and Regulations Worldwide.</description>
	<lastBuildDate>Sat, 20 Jan 2024 12:10:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://xnftcrypto.com/wp-content/uploads/2022/02/cropped-NFTfav1-32x32.png</url>
	<title>Hacking Archives - Exchange NFT &amp; CRYPTO</title>
	<link>https://xnftcrypto.com/tag/hacking/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Microsoft executive emails hacked by Russian intelligence group</title>
		<link>https://xnftcrypto.com/microsoft-executive-emails-hacked-by-russian-intelligence-group/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=microsoft-executive-emails-hacked-by-russian-intelligence-group</link>
					<comments>https://xnftcrypto.com/microsoft-executive-emails-hacked-by-russian-intelligence-group/#respond</comments>
		
		<dc:creator><![CDATA[xnftcrypto]]></dc:creator>
		<pubDate>Sat, 20 Jan 2024 12:10:02 +0000</pubDate>
				<category><![CDATA[Investment]]></category>
		<category><![CDATA[Breaking News: Politics]]></category>
		<category><![CDATA[Breaking News: Technology]]></category>
		<category><![CDATA[business news]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Microsoft Corp]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[SolarWinds Corp]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://xnftcrypto.com/microsoft-executive-emails-hacked-by-russian-intelligence-group/</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1920" height="1080" src="https://xnftcrypto.com/wp-content/uploads/2024/01/Microsoft-executive-emails-hacked-by-Russian-intelligence-group.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" fetchpriority="high" srcset="https://xnftcrypto.com/wp-content/uploads/2024/01/Microsoft-executive-emails-hacked-by-Russian-intelligence-group.jpg 1920w, https://xnftcrypto.com/wp-content/uploads/2024/01/Microsoft-executive-emails-hacked-by-Russian-intelligence-group-300x169.jpg 300w, https://xnftcrypto.com/wp-content/uploads/2024/01/Microsoft-executive-emails-hacked-by-Russian-intelligence-group-1024x576.jpg 1024w, https://xnftcrypto.com/wp-content/uploads/2024/01/Microsoft-executive-emails-hacked-by-Russian-intelligence-group-768x432.jpg 768w, https://xnftcrypto.com/wp-content/uploads/2024/01/Microsoft-executive-emails-hacked-by-Russian-intelligence-group-1536x864.jpg 1536w" sizes="(max-width: 1920px) 100vw, 1920px" /></div>
<p>[ad_1] Satya Nadella, CEO of Microsoft. CNBC Microsoft said in a Friday regulatory filing that a Russian intelligence group accessed some of the software maker&#8217;s top executives&#8217; email accounts. Nobelium, the same group that breached government supplier SolarWinds in 2020, carried out the attack, which Microsoft detected last week, according to the company. It isn&#8217;t [&#8230;]</p>
<p>The post <a href="https://xnftcrypto.com/microsoft-executive-emails-hacked-by-russian-intelligence-group/">Microsoft executive emails hacked by Russian intelligence group</a> appeared first on <a href="https://xnftcrypto.com">Exchange NFT &amp; CRYPTO</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1920" height="1080" src="https://xnftcrypto.com/wp-content/uploads/2024/01/Microsoft-executive-emails-hacked-by-Russian-intelligence-group.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://xnftcrypto.com/wp-content/uploads/2024/01/Microsoft-executive-emails-hacked-by-Russian-intelligence-group.jpg 1920w, https://xnftcrypto.com/wp-content/uploads/2024/01/Microsoft-executive-emails-hacked-by-Russian-intelligence-group-300x169.jpg 300w, https://xnftcrypto.com/wp-content/uploads/2024/01/Microsoft-executive-emails-hacked-by-Russian-intelligence-group-1024x576.jpg 1024w, https://xnftcrypto.com/wp-content/uploads/2024/01/Microsoft-executive-emails-hacked-by-Russian-intelligence-group-768x432.jpg 768w, https://xnftcrypto.com/wp-content/uploads/2024/01/Microsoft-executive-emails-hacked-by-Russian-intelligence-group-1536x864.jpg 1536w" sizes="(max-width: 1920px) 100vw, 1920px" /></div><p> [ad_1]<br />
</p>
<div id="RegularArticle-ArticleBody-5" data-module="ArticleBody" data-test="articleBody-2" data-analytics="RegularArticle-articleBody-5-2"><span class="HighlightShare-hidden" style="top:0;left:0"/></p>
<div class="InlineImage-imageEmbed" id="ArticleBody-InlineImage-106341013" data-test="InlineImage">
<div class="InlineImage-wrapper">
<div>
<p>Satya Nadella, CEO of Microsoft.</p>
<p>CNBC</p>
</div>
</div>
</div>
<div class="group">
<p><span class="QuoteInBody-quoteNameContainer" data-test="QuoteInBody" id="RegularArticle-QuoteInBody-1">Microsoft<span class="QuoteInBody-inlineButton"><span class="AddToWatchlistButton-watchlistContainer" id="-WatchlistDropdown" data-analytics-id="-WatchlistDropdown"><span class="AddToWatchlistButton-addWatchListFromTag"/></span></span></span> said in a Friday regulatory filing that a Russian intelligence group accessed some of the software maker&#8217;s top executives&#8217; email accounts. Nobelium, the same group that breached government supplier <span class="QuoteInBody-quoteNameContainer" data-test="QuoteInBody" id="RegularArticle-QuoteInBody-3">SolarWinds<span class="QuoteInBody-inlineButton"><span class="AddToWatchlistButton-watchlistContainer" id="-WatchlistDropdown" data-analytics-id="-WatchlistDropdown"><span class="AddToWatchlistButton-addWatchListFromTag"/></span></span></span> in 2020, carried out the attack, which Microsoft detected last week, according to the company.</p>
<p>It isn&#8217;t the first time Russian hackers have gained entry into Microsoft&#8217;s systems. State-sponsored attacks that can result in the dissemination of sensitive data becomes a greater risk during periods of armed conflict, and Russia&#8217;s war against Ukraine has been going on for almost two years now. On Thursday, Russia said Ukrainian forces conducted drone strikes in multiple Russian locations.</p>
<p>Microsoft&#8217;s announcement comes after new U.S. requirements for disclosing cybersecurity incidents went into effect. A Microsoft spokesperson said that while the company does not believe the attack had a material effect, it still wanted to honor the spirit of the rules.</p>
<p>The Cybersecurity and Infrastructure Security Agency is &#8220;closely coordinating with Microsoft to gain additional insights into this incident and understand impacts so we can help protect other potential victims,&#8221; CISA executive assistant director for cybersecurity Eric Goldstein said in a statement to CNBC. &#8220;As noted in Microsoft&#8217;s announcement, at this time we are not aware of impacts to Microsoft customer environments or products.&#8221; </p>
<p>In late November, the group accessed &#8220;a legacy non-production test tenant account,&#8221; Microsoft&#8217;s Security Response Center wrote in the blog post. After gaining access, the group &#8220;then used the account&#8217;s permissions to access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions, and exfiltrated some emails and attached documents,&#8221; the corporate unit wrote.</p>
<p>The company&#8217;s senior leadership team, including Chief Financial Offer Amy Hood and President Brad Smith, regularly meets with CEO Satya Nadella.</p>
<p>Microsoft said it has not found signs that Nobelium had accessed customer data, production systems or proprietary source code.</p>
<p>The U.S. government and Microsoft consider Nobelium to be part of the Russian foreign intelligence service SVR. The hacking group was responsible for one of the most prolific breaches in U.S. history when it added malicious code to updates to SolarWinds&#8217; Orion software, which some U.S. government agencies were using. Microsoft itself was ensnared in the hack.</p>
<p>Nobelium, also known as APT29 or Cozy Bear, is a sophisticated hacking group that has attempted to breach the systems of U.S. allies and the Department of Defense. Microsoft also uses the name Midnight Blizzard to identify Nobelium.</p>
<p>It was also implicated alongside another Russian hacking group in the 2016 breach of the Democratic National Committee&#8217;s systems.</p>
<p>Last year, a vulnerability in Microsoft software allowed China-aligned hackers to access the email accounts of senior government officials, including Commerce Secretary Gina Raimondo, ahead of a critical U.S.-China meeting. The company&#8217;s &#8220;negligent cybersecurity practices&#8221; led to the attack, Sen. Ron Wyden, a Democrat from Oregon, wrote in a letter to CISA director Jen Easterly, and other federal officials.</p>
<p>&#8220;We are continuing our investigation and will take additional actions based on the outcomes of this investigation and will continue working with law enforcement and appropriate regulators,&#8221; the Microsoft blog post said.</p>
<p>The Federal Bureau of Investigation told CNBC that it knows about the attack and is working with federal partners to help.</p>
<p>Don&#8217;t miss these stories from CNBC PRO:</p>
</div>
</div>
<p>[ad_2]<br />
<br /><a href="https://www.cnbc.com/2024/01/19/microsoft-executive-emails-hacked-by-russian-intelligence-group-company-says.html">Source link </a></p>
<p>The post <a href="https://xnftcrypto.com/microsoft-executive-emails-hacked-by-russian-intelligence-group/">Microsoft executive emails hacked by Russian intelligence group</a> appeared first on <a href="https://xnftcrypto.com">Exchange NFT &amp; CRYPTO</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://xnftcrypto.com/microsoft-executive-emails-hacked-by-russian-intelligence-group/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Know Your Crypto Compliance Episode 4: Crime Trends, Compliance Strategies, and Taxation in Crypto</title>
		<link>https://xnftcrypto.com/know-your-crypto-compliance-episode-4-crime-trends-compliance-strategies-and-taxation-in-crypto/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=know-your-crypto-compliance-episode-4-crime-trends-compliance-strategies-and-taxation-in-crypto</link>
					<comments>https://xnftcrypto.com/know-your-crypto-compliance-episode-4-crime-trends-compliance-strategies-and-taxation-in-crypto/#respond</comments>
		
		<dc:creator><![CDATA[xnftcrypto]]></dc:creator>
		<pubDate>Sat, 30 Sep 2023 08:12:42 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[altcoin price]]></category>
		<category><![CDATA[analytics]]></category>
		<category><![CDATA[bitcoin price]]></category>
		<category><![CDATA[bitcoin price prediction]]></category>
		<category><![CDATA[Blockchain]]></category>
		<category><![CDATA[Blockchain Analytics]]></category>
		<category><![CDATA[CeFi]]></category>
		<category><![CDATA[Centralized Exchanges]]></category>
		<category><![CDATA[Chainalysis]]></category>
		<category><![CDATA[Chainanalysis]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[Compliance Measures]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[crypto analysis]]></category>
		<category><![CDATA[Crypto Compliance]]></category>
		<category><![CDATA[Crypto Crime Report]]></category>
		<category><![CDATA[crypto guide for beginners]]></category>
		<category><![CDATA[crypto tax]]></category>
		<category><![CDATA[crypto trends]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[defi]]></category>
		<category><![CDATA[FinTech]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Illicit Funds]]></category>
		<category><![CDATA[investigations]]></category>
		<category><![CDATA[Kim Grauer]]></category>
		<category><![CDATA[Money Laundering]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Roger Brown]]></category>
		<category><![CDATA[Scams]]></category>
		<guid isPermaLink="false">https://xnftcrypto.com/know-your-crypto-compliance-episode-4-crime-trends-compliance-strategies-and-taxation-in-crypto/</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1280" height="720" src="https://xnftcrypto.com/wp-content/uploads/2023/09/Know-Your-Crypto-Compliance-Episode-4-Crime-Trends-Compliance-Strategies.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://xnftcrypto.com/wp-content/uploads/2023/09/Know-Your-Crypto-Compliance-Episode-4-Crime-Trends-Compliance-Strategies.jpg 1280w, https://xnftcrypto.com/wp-content/uploads/2023/09/Know-Your-Crypto-Compliance-Episode-4-Crime-Trends-Compliance-Strategies-300x169.jpg 300w, https://xnftcrypto.com/wp-content/uploads/2023/09/Know-Your-Crypto-Compliance-Episode-4-Crime-Trends-Compliance-Strategies-1024x576.jpg 1024w, https://xnftcrypto.com/wp-content/uploads/2023/09/Know-Your-Crypto-Compliance-Episode-4-Crime-Trends-Compliance-Strategies-768x432.jpg 768w" sizes="(max-width: 1280px) 100vw, 1280px" /></div>
<p>In Episode 4 of Know Your Crypto Compliance, we&#8217;re joined by Kim Grauer, Lead Researcher at Chainalysis, to discuss the &#8230; source</p>
<p>The post <a href="https://xnftcrypto.com/know-your-crypto-compliance-episode-4-crime-trends-compliance-strategies-and-taxation-in-crypto/">Know Your Crypto Compliance Episode 4: Crime Trends, Compliance Strategies, and Taxation in Crypto</a> appeared first on <a href="https://xnftcrypto.com">Exchange NFT &amp; CRYPTO</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1280" height="720" src="https://xnftcrypto.com/wp-content/uploads/2023/09/Know-Your-Crypto-Compliance-Episode-4-Crime-Trends-Compliance-Strategies.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://xnftcrypto.com/wp-content/uploads/2023/09/Know-Your-Crypto-Compliance-Episode-4-Crime-Trends-Compliance-Strategies.jpg 1280w, https://xnftcrypto.com/wp-content/uploads/2023/09/Know-Your-Crypto-Compliance-Episode-4-Crime-Trends-Compliance-Strategies-300x169.jpg 300w, https://xnftcrypto.com/wp-content/uploads/2023/09/Know-Your-Crypto-Compliance-Episode-4-Crime-Trends-Compliance-Strategies-1024x576.jpg 1024w, https://xnftcrypto.com/wp-content/uploads/2023/09/Know-Your-Crypto-Compliance-Episode-4-Crime-Trends-Compliance-Strategies-768x432.jpg 768w" sizes="auto, (max-width: 1280px) 100vw, 1280px" /></div><p><iframe loading="lazy"  width="580" height="385" src="https://www.youtube.com/embed/KXLPDSAtrIQ" frameborder="0" allowfullscreen></iframe><br />
<br />In Episode 4 of Know Your Crypto Compliance, we&#8217;re joined by Kim Grauer, Lead Researcher at Chainalysis, to discuss the &#8230;<br />
<br /><a href="https://www.youtube.com/watch?v=KXLPDSAtrIQ">source</a></p>
<p>The post <a href="https://xnftcrypto.com/know-your-crypto-compliance-episode-4-crime-trends-compliance-strategies-and-taxation-in-crypto/">Know Your Crypto Compliance Episode 4: Crime Trends, Compliance Strategies, and Taxation in Crypto</a> appeared first on <a href="https://xnftcrypto.com">Exchange NFT &amp; CRYPTO</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://xnftcrypto.com/know-your-crypto-compliance-episode-4-crime-trends-compliance-strategies-and-taxation-in-crypto/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>China hackers breach emails of U.S. diplomats Nicholas Burns, Kritenbrink</title>
		<link>https://xnftcrypto.com/china-hackers-breach-emails-of-u-s-diplomats-nicholas-burns-kritenbrink/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=china-hackers-breach-emails-of-u-s-diplomats-nicholas-burns-kritenbrink</link>
					<comments>https://xnftcrypto.com/china-hackers-breach-emails-of-u-s-diplomats-nicholas-burns-kritenbrink/#respond</comments>
		
		<dc:creator><![CDATA[xnftcrypto]]></dc:creator>
		<pubDate>Fri, 21 Jul 2023 06:02:42 +0000</pubDate>
				<category><![CDATA[Investment]]></category>
		<category><![CDATA[Antony Blinken]]></category>
		<category><![CDATA[Breaking News: Politics]]></category>
		<category><![CDATA[business news]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Foreign policy]]></category>
		<category><![CDATA[Government and politics]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Nicholas Burns]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://xnftcrypto.com/china-hackers-breach-emails-of-u-s-diplomats-nicholas-burns-kritenbrink/</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1920" height="1080" src="https://xnftcrypto.com/wp-content/uploads/2023/07/China-hackers-breach-emails-of-US-diplomats-Nicholas-Burns-Kritenbrink.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://xnftcrypto.com/wp-content/uploads/2023/07/China-hackers-breach-emails-of-US-diplomats-Nicholas-Burns-Kritenbrink.jpeg 1920w, https://xnftcrypto.com/wp-content/uploads/2023/07/China-hackers-breach-emails-of-US-diplomats-Nicholas-Burns-Kritenbrink-300x169.jpeg 300w, https://xnftcrypto.com/wp-content/uploads/2023/07/China-hackers-breach-emails-of-US-diplomats-Nicholas-Burns-Kritenbrink-1024x576.jpeg 1024w, https://xnftcrypto.com/wp-content/uploads/2023/07/China-hackers-breach-emails-of-US-diplomats-Nicholas-Burns-Kritenbrink-768x432.jpeg 768w, https://xnftcrypto.com/wp-content/uploads/2023/07/China-hackers-breach-emails-of-US-diplomats-Nicholas-Burns-Kritenbrink-1536x864.jpeg 1536w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></div>
<p>[ad_1] US Secretary of State Antony Blinken (L) shakes hands with China&#8217;s Director of the Office of the Central Foreign Affairs Commission Wang Yi at the Diaoyutai State Guesthouse in Beijing on June 19, 2023. (Photo by Leah MILLIS / POOL / AFP) (Photo by LEAH MILLIS/POOL/AFP via Getty Images) Leah Millis &#124; Afp &#124; [&#8230;]</p>
<p>The post <a href="https://xnftcrypto.com/china-hackers-breach-emails-of-u-s-diplomats-nicholas-burns-kritenbrink/">China hackers breach emails of U.S. diplomats Nicholas Burns, Kritenbrink</a> appeared first on <a href="https://xnftcrypto.com">Exchange NFT &amp; CRYPTO</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1920" height="1080" src="https://xnftcrypto.com/wp-content/uploads/2023/07/China-hackers-breach-emails-of-US-diplomats-Nicholas-Burns-Kritenbrink.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://xnftcrypto.com/wp-content/uploads/2023/07/China-hackers-breach-emails-of-US-diplomats-Nicholas-Burns-Kritenbrink.jpeg 1920w, https://xnftcrypto.com/wp-content/uploads/2023/07/China-hackers-breach-emails-of-US-diplomats-Nicholas-Burns-Kritenbrink-300x169.jpeg 300w, https://xnftcrypto.com/wp-content/uploads/2023/07/China-hackers-breach-emails-of-US-diplomats-Nicholas-Burns-Kritenbrink-1024x576.jpeg 1024w, https://xnftcrypto.com/wp-content/uploads/2023/07/China-hackers-breach-emails-of-US-diplomats-Nicholas-Burns-Kritenbrink-768x432.jpeg 768w, https://xnftcrypto.com/wp-content/uploads/2023/07/China-hackers-breach-emails-of-US-diplomats-Nicholas-Burns-Kritenbrink-1536x864.jpeg 1536w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></div><p> [ad_1]<br />
</p>
<div id="RegularArticle-ArticleBody-5" data-module="ArticleBody" data-test="articleBody-2" data-analytics="RegularArticle-articleBody-5-2"><span class="HighlightShare-hidden" style="top:0;left:0"/></p>
<div class="InlineImage-imageEmbed" id="ArticleBody-InlineImage-107258818" data-test="InlineImage">
<div class="InlineImage-wrapper">
<div>
<p>US Secretary of State Antony Blinken (L) shakes hands with China&#8217;s Director of the Office of the Central Foreign Affairs Commission Wang Yi at the Diaoyutai State Guesthouse in Beijing on June 19, 2023. (Photo by Leah MILLIS / POOL / AFP) (Photo by LEAH MILLIS/POOL/AFP via Getty Images)</p>
<p>Leah Millis | Afp | Getty Images</p>
</div>
</div>
</div>
<div class="group">
<p>China-linked hackers breached the email account of U.S. Ambassador to China Nicholas Burns, as part of a recent targeted intelligence-gathering campaign, NBC News has confirmed.</p>
<p>The hackers also accessed the email account of Daniel Kritenbrink, the assistant Secretary of State for East Asia, who recently travelled with Secretary of State Antony Blinken to China, said NBC, citing two U.S. officials familiar with the matter. </p>
<p>CNBC reached out to China&#8217;s Foreign Ministry for comment but has yet to hear back.</p>
<p>The beach was limited to the diplomats&#8217; unclassified email accounts, NBC said adding that Secretary of Commerce Gina Raimondo&#8217;s email account was also accessed in the breach, as previously reported.</p>
<p>The news, first reported by the Wall Street Journal, further fuels the fallout for the U.S. of the alleged Chinese hack first revealed last week. </p>
</div>
<div role="region" aria-labelledby="Placeholder-ArticleBody-Video-107268918">
<div role="button" tabindex="0" id="Placeholder-ArticleBody-Video-107268918" class="PlaceHolder-wrapper" data-vilynx-id="7000307155" data-test="VideoPlaceHolder">
<div class="InlineVideo-videoEmbed" id="InlineVideo-0" data-test="InlineVideo">
<div class="InlineVideo-wrapper">
<div class="InlineVideo-inlineThumbnailContainer"><img decoding="async" class="InlineVideo-videoThumbnail" src="https://image.cnbcfm.com/api/v1/image/107268919-16889996281688999624-30242742472-1080pnbcnews.jpg?v=1689000399&amp;w=750&amp;h=422&amp;vtcrop=y" alt="Yellen's latest trip continued to stabilize the U.S.-China relationship: Jeff Moon"/><span class="InlineVideo-videoButton"/><span/></div>
</div>
</div>
</div>
</div>
<div class="group">
<p>Late Tuesday, Microsoft announced it had discovered that China-based hackers breached email accounts of about 25 organizations, including some U.S. government agencies, in a significant breach.</p>
<p>The compromise was &#8220;mitigated&#8221; by Microsoft cybersecurity teams after it was first reported to the company in mid-June 2023, Microsoft said in two blog posts about the incidents. The hackers had been inside government systems since at least May, the company said.</p>
</div>
<h2 class="ArticleBody-subtitle">U.S. warns China</h2>
<div class="group">
<p>Blinken said he raised the issue of the Chinese hacking when he met China&#8217;s top diplomat Wang Yi in Jakarta last week, on the sidelines of the Association of Southeast Asian Nations regional meeting.</p>
<p>The U.S. Secretary noted he made clear to Wang that Washington will ensure the hackers are held responsible for alleged breaches of U.S. government agencies.</p>
<p>&#8220;First of all, this is something that the State Department actually detected last month, and we took immediate steps to protect our systems, to report the incident – in this case, notifying a company, Microsoft, of the event,&#8221; Blinken said at a press briefing.</p>
<p>&#8220;I can&#8217;t discuss details of our response beyond that, and most critically this incident remains under investigation,&#8221; he added.</p>
<p>Still, Blinken said that as a general matter, &#8220;we have consistently made clear to China as well as to other countries that any action that targets the U.S. Government or U.S. companies, American citizens, is of deep concern to us, and we will take appropriate action in response.&#8221;</p>
<p>The secretary&#8217;s latest meeting with Wang came less than a month after Blinken made a rare trip to Beijing under the Biden administration.</p>
<p>The visit was aimed at soothing ties between the world&#8217;s two largest economies amid escalating tensions.</p>
<p>Security experts have argued the incidents demonstrate an acceleration in Beijing&#8217;s digital spying capabilities.</p>
<p>&#8220;Chinese cyber espionage operators&#8217; tactics had steadily evolved to become more agile, stealthier, and complex to attribute&#8221; over the last decade, researchers at cybersecurity firm Mandiant wrote in a blog post Tuesday.</p>
<p>— CNBC&#8217;s Rohan Goswami contributed to this report.</p>
</div>
</div>
<p>[ad_2]<br />
<br /><a href="https://www.cnbc.com/2023/07/21/china-hackers-breach-emails-of-us-diplomats-nicholas-burns-kritenbrink.html">Source link </a></p>
<p>The post <a href="https://xnftcrypto.com/china-hackers-breach-emails-of-u-s-diplomats-nicholas-burns-kritenbrink/">China hackers breach emails of U.S. diplomats Nicholas Burns, Kritenbrink</a> appeared first on <a href="https://xnftcrypto.com">Exchange NFT &amp; CRYPTO</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://xnftcrypto.com/china-hackers-breach-emails-of-u-s-diplomats-nicholas-burns-kritenbrink/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Temu accused of data risks amid TikTok, Pinduoduo fears</title>
		<link>https://xnftcrypto.com/temu-accused-of-data-risks-amid-tiktok-pinduoduo-fears/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=temu-accused-of-data-risks-amid-tiktok-pinduoduo-fears</link>
					<comments>https://xnftcrypto.com/temu-accused-of-data-risks-amid-tiktok-pinduoduo-fears/#respond</comments>
		
		<dc:creator><![CDATA[xnftcrypto]]></dc:creator>
		<pubDate>Wed, 17 May 2023 02:34:25 +0000</pubDate>
				<category><![CDATA[Investment]]></category>
		<category><![CDATA[Apparel Retail]]></category>
		<category><![CDATA[business news]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[PDD Holdings Inc]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Social media]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[U.S. Economy]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://xnftcrypto.com/temu-accused-of-data-risks-amid-tiktok-pinduoduo-fears/</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1920" height="1080" src="https://xnftcrypto.com/wp-content/uploads/2023/05/Temu-accused-of-data-risks-amid-TikTok-Pinduoduo-fears.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://xnftcrypto.com/wp-content/uploads/2023/05/Temu-accused-of-data-risks-amid-TikTok-Pinduoduo-fears.jpeg 1920w, https://xnftcrypto.com/wp-content/uploads/2023/05/Temu-accused-of-data-risks-amid-TikTok-Pinduoduo-fears-300x169.jpeg 300w, https://xnftcrypto.com/wp-content/uploads/2023/05/Temu-accused-of-data-risks-amid-TikTok-Pinduoduo-fears-1024x576.jpeg 1024w, https://xnftcrypto.com/wp-content/uploads/2023/05/Temu-accused-of-data-risks-amid-TikTok-Pinduoduo-fears-768x432.jpeg 768w, https://xnftcrypto.com/wp-content/uploads/2023/05/Temu-accused-of-data-risks-amid-TikTok-Pinduoduo-fears-1536x864.jpeg 1536w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></div>
<p>[ad_1] In just 17 days after launch, Temu surpassed Instagram, WhatsApp, Snapchat and Shein on the Apple App Store in the U.S., according to Apptopia data shared with CNBC. Stefani Reynolds &#124; Afp &#124; Getty Images The U.S. has accused discount shopping site Temu of possible data risks after its Chinese sister app was pulled [&#8230;]</p>
<p>The post <a href="https://xnftcrypto.com/temu-accused-of-data-risks-amid-tiktok-pinduoduo-fears/">Temu accused of data risks amid TikTok, Pinduoduo fears</a> appeared first on <a href="https://xnftcrypto.com">Exchange NFT &amp; CRYPTO</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1920" height="1080" src="https://xnftcrypto.com/wp-content/uploads/2023/05/Temu-accused-of-data-risks-amid-TikTok-Pinduoduo-fears.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://xnftcrypto.com/wp-content/uploads/2023/05/Temu-accused-of-data-risks-amid-TikTok-Pinduoduo-fears.jpeg 1920w, https://xnftcrypto.com/wp-content/uploads/2023/05/Temu-accused-of-data-risks-amid-TikTok-Pinduoduo-fears-300x169.jpeg 300w, https://xnftcrypto.com/wp-content/uploads/2023/05/Temu-accused-of-data-risks-amid-TikTok-Pinduoduo-fears-1024x576.jpeg 1024w, https://xnftcrypto.com/wp-content/uploads/2023/05/Temu-accused-of-data-risks-amid-TikTok-Pinduoduo-fears-768x432.jpeg 768w, https://xnftcrypto.com/wp-content/uploads/2023/05/Temu-accused-of-data-risks-amid-TikTok-Pinduoduo-fears-1536x864.jpeg 1536w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></div><p> [ad_1]<br />
</p>
<div id="RegularArticle-ArticleBody-5" data-module="ArticleBody" data-test="articleBody-2" data-analytics="RegularArticle-articleBody-5-2"><span class="HighlightShare-hidden" style="top:0;left:0"/></p>
<div class="InlineImage-imageEmbed" id="ArticleBody-InlineImage-107232553" data-test="InlineImage">
<div class="InlineImage-wrapper">
<div>
<p>In just 17 days after launch, Temu surpassed Instagram, WhatsApp, Snapchat and Shein on the Apple App Store in the U.S., according to Apptopia data shared with CNBC.</p>
<p>Stefani Reynolds | Afp | Getty Images</p>
</div>
</div>
</div>
<div class="group">
<p>The U.S. has accused discount shopping site Temu of possible data risks after its Chinese sister app was pulled from Google&#8217;s app store over &#8220;malware&#8221; — but analysts say they&#8217;re not that worried.</p>
<p>Compared to Pinduoduo, which was suspended by Google in March after versions offered outside Google&#8217;s Play store were found to contain malware, Temu is &#8220;not as aggressive,&#8221; one analyst said.</p>
<p>The malware in Pinduoduo was found to leverage specific vulnerabilities for Android phones, allowing the app to bypass user security permissions, access private messages, modify settings, view data from other apps and prevent uninstallation.</p>
<p>Google called it an &#8220;identified malicious app&#8221; and urged users to uninstall the Pinduoduo app, but the Chinese online retailer denied those claims.</p>
<p>According to analysis by Kevin Reed, chief information security officer at cybersecurity firm Acronis, Pinduoduo requests for as many as 83 permissions — including access to biometrics, Bluetooth and information about Wi-Fi networks.</p>
<p>&#8220;Some of these permissions Pinduoduo is asking seems to be unexpected for an e-commerce app,&#8221; said Reed, who shared his analysis of both apps with CNBC.</p>
<p>&#8220;But Temu is not as aggressive as Pinduoduo that is requesting all kinds of privileges,&#8221; said Reed.</p>
<p>Pinduoduo is a China-based e-commerce app that sells everything from groceries to clothing. It is the flagship product of Nasdaq-listed Chinese company <span class="QuoteInBody-quoteNameContainer" data-test="QuoteInBody" id="RegularArticle-QuoteInBody-3">PDD Holdings<span class="QuoteInBody-inlineButton"><span class="AddToWatchlistButton-watchlistContainer" id="-WatchlistDropdown" data-analytics-id="-WatchlistDropdown"><span class="AddToWatchlistButton-addWatchListFromTag"/></span></span></span> which also owns Temu. Temu&#8217;s headquarters are located in Boston.</p>
</div>
<blockquote data-test="Pullquote">
<div class="Pullquote-pullquote" style="border-top-color:#002f6c">
<div>
<p>Pinduoduo is much more aggressive in collecting users&#8217; information and obviously transfer it back to the company.</p>
<div class="Pullquote-sourceWrapper">
<p>Kevin Reed</p>
<p>chief information security officer, Acronis</p>
</div>
</div>
</div>
</blockquote>
<div class="group">
<p>&#8220;There should be no need for biometric data to be stored on an e-commerce website or app. I personally wouldn&#8217;t want my biometric data to be stored anywhere else other than my device,&#8221; said Sean Duca, vice president and regional chief security officer for Asia Pacific and Japan at cybersecurity firm Palo Alto Networks.</p>
<p>&#8220;Biometrics have a lot greater value than anything else, because I can&#8217;t simply change my fingerprint at all, unlike passwords,&#8221; said Duca.</p>
<p>He also questioned why access to Wi-Fi information was necessary. If it is corporate Wi-Fi that the user is connected to, it will &#8220;become a very lucrative target for cyber criminals where they start to actually gain access to this information,&#8221; cautioned Duca. &#8220;But why does an e-commerce provider actually need that?&#8221;</p>
</div>
<h2 class="ArticleBody-subtitle">What does Temu do?</h2>
<div class="group">
<p>Temu, dubbed a copycat of fast-fashion label Shein, is taking the U.S. market by storm.</p>
<p>Just 17 days after its launch in September, the app surpassed Instagram, WhatsApp, Snapchat and Shein on the Apple App Store in the U.S., according to Apptopia data shared with CNBC. It launched in the U.K. in March, just weeks after entering Australia and New Zealand.</p>
<p>The fact that Pinduoduo &#8220;has requested even more permissions than Temu app even though they seem to be a similar kind of applications seems over-intrusive to me,&#8221; said Reed.</p>
<p>&#8220;Pinduoduo is much more aggressive in collecting users&#8217; information,&#8221; said Reed who claimed the data was &#8220;obviously [transferred] back to the company.&#8221;</p>
<p>PDD Holdings did not respond to CNBC&#8217;s request for comment regarding those permissions.</p>
<p>In comparison, the Temu app requests for 24 permissions, said Reed. Some of these permissions include access to Bluetooth and information about Wi-Fi networks.</p>
</div>
<blockquote data-test="Pullquote">
<div class="Pullquote-pullquote" style="border-top-color:#002f6c">
<div>
<p>I am less worried about the shopping apps than social media platforms like TikTok and Lemon8.</p>
<div class="Pullquote-sourceWrapper">
<p>Lindsay Gorman</p>
<p>Senior fellow for emerging tech, German Marshall Fund</p>
</div>
</div>
</div>
</blockquote>
<div class="group">
<p>&#8220;There have been no reports of the malicious functionality present in oﬀicial Play, App Store or third-party versions of Temu. The keys used to sign the Pinduoduo malware are not the same keys used to sign the Temu app,&#8221; said Daniel Thanos, vice president and head of Arctic Wolf Labs, the threat intelligence arm of cybersecurity firm Arctic Wolf.</p>
<p>&#8220;Based on our analysis, it appears that this malware is targeting Chinese users primarily, as it appears to target devices usually sold and used in China such as Xiaomi, Vivo, Oppo, Samsung, etc, and their corresponding applications,&#8221; said Thanos. PDD Holdings did not immediately respond to CNBC&#8217;s request for comment.</p>
</div>
<h2 class="ArticleBody-subtitle">Data risks</h2>
<div class="group">
<p>In a report on Chinese &#8220;fast fashion&#8221; platforms published in April, the U.S.-China Economic and Security Review Commission accused Temu and Shein of posing possible data risks.</p>
<p>Shein and Temu &#8220;primarily rely on U.S. consumers downloading and using Chinese apps to curate and deliver products,&#8221; said the report.</p>
<p>&#8220;These firms&#8217; commercial success has encouraged both established Chinese e-commerce platforms and startups to copy its model, posing risks and challenges to U.S. regulations, laws, and principles of market access,&#8221; it said.</p>
<p>Chinese-owned apps face intense scrutiny in the U.S. over security concerns. U.S. lawmakers have cautioned that any Chinese-owned apps could be vulnerable to data privacy breaches or interference from the Chinese government.</p>
<p>While politicians often accuse Chinese companies of handing data over to the Chinese government, there is no evidence to support such claims.</p>
<p>&#8220;But there&#8217;s also a larger play here, which is many other apps that are not talked about are also collecting information and have been doing so for such a very long time,&#8221; said Duca, noting it is more of a systemic problem.</p>
</div>
<div class="group">
<div class="RelatedContent-relatedContent" id="RegularArticle-RelatedContent-1">
<div class="RelatedContent-container">
<div class="RelatedContent-nonCollapsibleContent">
<h2 class="RelatedContent-header">Read more about tech and crypto from CNBC Pro</h2>
</div>
</div>
</div>
</div>
<div class="group">
<p>One analyst said she was less worried about shopping apps than social media platforms such as TikTok and its sister app Lemon8.</p>
<p>&#8220;From a national security standpoint, in addition to creating user profiles with all these data, social media platforms also have the ability to select, promote and demote content based on opaque metrics that ultimately, we don&#8217;t really have an insight into,&#8221; said Lindsay Gorman, senior fellow for emerging tech at the German Marshall Fund.</p>
<p>For shopping apps, the &#8220;real sort of content influence&#8221; may be Chinese companies promoting their products which &#8220;feels less of a threat to democracy,&#8221; said Gorman. Instead, social media apps could promote content about political topics which are much harder to track, she said.</p>
<p>TikTok faces a possible ban in the U.S. after its CEO Shou Zi Chew&#8217;s testimony before Congress, which failed to quell lawmakers&#8217; concerns about the app&#8217;s ties to China or the adequacy of Project Texas, its plan to store U.S. data on American soil.</p>
<p>&#8220;ByteDance is not owned or controlled by the Chinese government. It&#8217;s a private company,&#8221; Chew said during the hearing.</p>
</div>
<div role="region" aria-labelledby="Placeholder-ArticleBody-Video-107214477">
<div role="button" tabindex="0" id="Placeholder-ArticleBody-Video-107214477" class="PlaceHolder-wrapper" data-vilynx-id="7000291447" data-test="VideoPlaceHolder">
<div class="InlineVideo-videoEmbed" id="InlineVideo-0" data-test="InlineVideo">
<div class="InlineVideo-wrapper">
<div class="InlineVideo-inlineThumbnailContainer"><img decoding="async" class="InlineVideo-videoThumbnail" src="https://image.cnbcfm.com/api/v1/image/107214478-16796238941679623891-28711403880-1080pnbcnews.jpg?v=1679632131&amp;w=750&amp;h=422&amp;vtcrop=y" alt="I don't think a shutdown or ban of TikTok is needed, analyst says"/><span class="InlineVideo-videoButton"/><span/></div>
</div>
</div>
</div>
</div>
<div class="group">
<p>In his first public interview since the congressional hearing, Chew said at the TED2023 conference last week: &#8220;We are building all the tools to prevent any of [Chinese government interference in U.S. elections] from happening.&#8221; </p>
<p>He said he was &#8220;very confident&#8221; the risk can be reduced to as close as zero with the company being &#8220;very, very far along&#8221; with Project Texas.</p>
<p>Another analyst, Glenn Gerstell, senior advisor at Center for Strategic and International Studies, said these apps are &#8220;ultimately controlled by Chinese parties and that&#8217;s what the American political system is going to be focused on.&#8221; Geopolitical tensions with China will continue to put Chinese apps under scrutiny.</p>
<p>&#8220;It may be that if we got more sophisticated, we&#8217;d be able to distinguish one app from another and create a safer, more limited and controlled space. But right now, we don&#8217;t have that system in place,&#8221; said Gerstell.</p>
</div>
</div>
<p>[ad_2]<br />
<br /><a href="https://www.cnbc.com/2023/05/17/temu-accused-of-data-risks-amid-tiktok-pinduoduo-fears.html">Source link </a></p>
<p>The post <a href="https://xnftcrypto.com/temu-accused-of-data-risks-amid-tiktok-pinduoduo-fears/">Temu accused of data risks amid TikTok, Pinduoduo fears</a> appeared first on <a href="https://xnftcrypto.com">Exchange NFT &amp; CRYPTO</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://xnftcrypto.com/temu-accused-of-data-risks-amid-tiktok-pinduoduo-fears/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>China security crackdown may be a new dawn for foreign investors</title>
		<link>https://xnftcrypto.com/china-security-crackdown-may-be-a-new-dawn-for-foreign-investors/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=china-security-crackdown-may-be-a-new-dawn-for-foreign-investors</link>
					<comments>https://xnftcrypto.com/china-security-crackdown-may-be-a-new-dawn-for-foreign-investors/#respond</comments>
		
		<dc:creator><![CDATA[xnftcrypto]]></dc:creator>
		<pubDate>Tue, 16 May 2023 02:32:26 +0000</pubDate>
				<category><![CDATA[Investment]]></category>
		<category><![CDATA[Asia Economy]]></category>
		<category><![CDATA[Beijing]]></category>
		<category><![CDATA[business news]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Foreign policy]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[National security]]></category>
		<category><![CDATA[Shanghai]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://xnftcrypto.com/china-security-crackdown-may-be-a-new-dawn-for-foreign-investors/</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1920" height="1080" src="https://xnftcrypto.com/wp-content/uploads/2023/05/China-security-crackdown-may-be-a-new-dawn-for-foreign.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://xnftcrypto.com/wp-content/uploads/2023/05/China-security-crackdown-may-be-a-new-dawn-for-foreign.jpeg 1920w, https://xnftcrypto.com/wp-content/uploads/2023/05/China-security-crackdown-may-be-a-new-dawn-for-foreign-300x169.jpeg 300w, https://xnftcrypto.com/wp-content/uploads/2023/05/China-security-crackdown-may-be-a-new-dawn-for-foreign-1024x576.jpeg 1024w, https://xnftcrypto.com/wp-content/uploads/2023/05/China-security-crackdown-may-be-a-new-dawn-for-foreign-768x432.jpeg 768w, https://xnftcrypto.com/wp-content/uploads/2023/05/China-security-crackdown-may-be-a-new-dawn-for-foreign-1536x864.jpeg 1536w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></div>
<p>[ad_1] Chinese authorities have carried out an investigation into consulting firm Capvision Partners, state media CCTV reported on May 8. CCTV said that investigations by Chinese national security authorities had found that overseas institutions have used domestic consulting firms to steal state secrets and intelligence on areas key to China. China Photos &#124; Getty Images [&#8230;]</p>
<p>The post <a href="https://xnftcrypto.com/china-security-crackdown-may-be-a-new-dawn-for-foreign-investors/">China security crackdown may be a new dawn for foreign investors</a> appeared first on <a href="https://xnftcrypto.com">Exchange NFT &amp; CRYPTO</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1920" height="1080" src="https://xnftcrypto.com/wp-content/uploads/2023/05/China-security-crackdown-may-be-a-new-dawn-for-foreign.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://xnftcrypto.com/wp-content/uploads/2023/05/China-security-crackdown-may-be-a-new-dawn-for-foreign.jpeg 1920w, https://xnftcrypto.com/wp-content/uploads/2023/05/China-security-crackdown-may-be-a-new-dawn-for-foreign-300x169.jpeg 300w, https://xnftcrypto.com/wp-content/uploads/2023/05/China-security-crackdown-may-be-a-new-dawn-for-foreign-1024x576.jpeg 1024w, https://xnftcrypto.com/wp-content/uploads/2023/05/China-security-crackdown-may-be-a-new-dawn-for-foreign-768x432.jpeg 768w, https://xnftcrypto.com/wp-content/uploads/2023/05/China-security-crackdown-may-be-a-new-dawn-for-foreign-1536x864.jpeg 1536w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></div><p> [ad_1]<br />
</p>
<div id="RegularArticle-ArticleBody-5" data-module="ArticleBody" data-test="articleBody-2" data-analytics="RegularArticle-articleBody-5-2"><span class="HighlightShare-hidden" style="top:0;left:0"/></p>
<div class="InlineImage-imageEmbed" id="ArticleBody-InlineImage-107237898" data-test="InlineImage">
<div class="InlineImage-wrapper">
<div>
<p>Chinese authorities have carried out an investigation into consulting firm Capvision Partners, state media CCTV reported on May 8. CCTV said that investigations by Chinese national security authorities had found that overseas institutions have used domestic consulting firms to steal state secrets and intelligence on areas key to China.</p>
<p>China Photos | Getty Images News | Getty Images</p>
</div>
</div>
</div>
<div class="group">
<p>China wants foreign investment, but it wants them on its own terms.</p>
<p>However, Beijing&#8217;s terms aren&#8217;t clear for now — and it&#8217;s raised concerns and triggered second guessing in the global business community.</p>
<p>Last Monday, state broadcaster CCTV singled out a consulting company for not complying with China&#8217;s national security laws.</p>
<p>Shanghai-based Capvision Partners was just the latest company recently subjected to such investigations in the mainland. In March, U.S. due diligence firm Mintz told Reuters police raided its Beijing office, and detained some of its Chinese staff. In April, U.S. management consultancy Bain &amp; Co reportedly confirmed police visited its Shanghai office.</p>
<p>These firms provide due diligence services, which companies and investors routinely employ to determine whether suppliers are complying with rules and regulations – not just in China, but in other jurisdictions as well. They also audit supply chains, among many other services.</p>
<p>At a time when China is actively encouraging foreign investment into the world&#8217;s second-largest economy that has been deeply hurt by the country&#8217;s long-held zero-Covid policy, such an escalation in China&#8217;s concerns about data is hurting sentiment and seems at odds with its overt claims of openness.</p>
<p>&#8220;It may seem a paradox,&#8221; said Chong Ja Ian, an associate professor at the National University of Singapore who studies Chinese foreign policy. &#8220;But this is consistent with what we have seen of the current China leadership: they want more control over all facets of society.&#8221;</p>
<p>&#8220;This is a government that built its legitimacy on performance, so they would be anxious to maintain a perception of control when the country is facing more pressures from different directions now,&#8221; he told CNBC.</p>
</div>
<blockquote data-test="Pullquote">
<div class="Pullquote-pullquote" style="border-top-color:#002f6c">
<div>
<p>&#8230; So much of what is now regarded as national security or state secrets is not sufficiently defined or classified.</p>
</div>
</div>
</blockquote>
<div class="group">
<p>&#8220;This is a government that built its legitimacy on performance, so they would be anxious to maintain a perception of control when the country is facing more pressures from different directions now, including demands for more access to information,&#8221; Chong added.</p>
<p>At a regular press conference helmed by China&#8217;s Foreign Ministry a week ago, Beijing appeared keen to downplay the Capvision probe as an isolated incident.</p>
<p>&#8220;These are normal law enforcement actions consistent with Chinese laws that aim to promote sound and well-regulated growth of relevant sector and safeguard national security and development interests,&#8221; said ministry spokesperson Wang Wenbin.</p>
</div>
<h2 class="ArticleBody-subtitle">&#8216;Arbitrary&#8217; enforcement</h2>
<div class="group">
<div class="RelatedContent-relatedContent" id="RegularArticle-RelatedContent-1">
<div class="RelatedContent-container">
<div class="RelatedContent-nonCollapsibleContent">
<h2 class="RelatedContent-header">Read more about China from CNBC Pro</h2>
</div>
</div>
</div>
</div>
<div class="group">
<p>&#8220;The enforcement actions seem very arbitrary now,&#8221; Lester Ross, a foreign lawyer in China, told CNBC. &#8220;To have multiple companies involved now in this crackdown and the restriction of financial data to foreigners, it appears that Chinese security departments are on to something larger.&#8221;</p>
<p>&#8220;A major question about Chinese law generally is the need for greater precision in delineating what&#8217;s permissible and what&#8217;s not: so much of what is now regarded as national security or state secrets is not sufficiently defined or classified,&#8221; Ross added.</p>
</div>
<h2 class="ArticleBody-subtitle">Leaked state secrets?</h2>
<div class="group">
<p>The accusations against Capvision included claims the consultancy was among those used by foreign institutions with &#8220;complex backgrounds&#8221; as a pretext to steal state secrets and intelligence in key sectors while evading the law. Chinese authorities alleged that Capvision accepted more than 2,000 remittances from hundreds of overseas companies totaling $70 million between 2017 and 2020, according to a CNBC translation.</p>
<p>State-owned CCTV claimed that Capvision tapped on a vast &#8220;network of experts&#8221; of about 300,000 people in areas ranging from domestic policy research, national defense and military technology to banking, finance and medicine.</p>
<p>The CCTV program also claimed to feature one of Capvision&#8217;s experts who was convicted of disclosing information relating to the number of unnamed military aircraft on the inventory of a particular institution or company, according to a CNBC translation.</p>
</div>
<div class="InlineImage-imageEmbed" id="ArticleBody-InlineImage-107240897" data-test="InlineImage">
<div class="InlineImage-wrapper">
<div>
<p>A building official stands outside the Capvision office in Beijing on May 10, 2023. China said on May 9 a raid by authorities on US consultancy Capvision&#8217;s offices in the country was aimed at safeguarding its &#8220;national security and development interests&#8221;.</p>
<p>Greg Baker | Afp | Getty Images</p>
</div>
</div>
</div>
<div class="group">
<p>In a sign that last week&#8217;s state media report has triggered plenty of reassessment in the business community, the state-owned Securities Times reported last Thursday that Chinese regulators have instructed mainland Chinese brokerages securities firms to strengthen compliance over sensitive information, expert invitation and interviews.</p>
<p>The American and European chambers of commerce in China also expressed concern.</p>
<p>The recent investigations &#8220;risk heightening uncertainty at a time when European companies are looking for clear signs that China&#8217;s business environment is becoming more reliable and predictable,&#8221; the European Chamber of Commerce in China said in a statement. &#8220;The European Chamber respects the rule of law and expects it to be followed in these cases.&#8221;</p>
<p>Last Wednesday, Capvision pledged to &#8220;actively address&#8221; demands by Chinese authorities about the company&#8217;s negligence of its national security responsibilities, having formed a three-person internal &#8220;compliance committee&#8221; chaired by its chief executive Xu Rujie.</p>
<p>&#8220;We are deeply aware we have failed to fully comply with national security responsibilities in our past business activities and there are major hidden dangers and loopholes that have led to serious danger to the country&#8217;s national security,&#8221; the Shanghai-based company said in a statement, according to a CNBC translation.</p>
<p>Without more details on what is permissible could make it more difficult for prospective investors to do their due diligence before committing to deals, particularly given the nature of doing business in China.</p>
<p>&#8220;In a state-driven economy like China&#8217;s, a lot of local Chinese companies would have dealings with the government at various levels,&#8221; said Chong from NUS. &#8220;So some commercial data would inevitably have political and national security implications.&#8221;</p>
<p>&#8220;I am not sure if the Chinese government is interested in being more precise about what it means,&#8221; the professor added. &#8220;After all, ambiguity and lack of clarity is a tool commonly used by authoritarian governments to retain and enhance its control.&#8221;</p>
</div>
</div>
<p>[ad_2]<br />
<br /><a href="https://www.cnbc.com/2023/05/16/china-data-crackdown-could-usher-in-new-realities-for-foreign-investors.html">Source link </a></p>
<p>The post <a href="https://xnftcrypto.com/china-security-crackdown-may-be-a-new-dawn-for-foreign-investors/">China security crackdown may be a new dawn for foreign investors</a> appeared first on <a href="https://xnftcrypto.com">Exchange NFT &amp; CRYPTO</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://xnftcrypto.com/china-security-crackdown-may-be-a-new-dawn-for-foreign-investors/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What has Anonymous done to Russia? Here are the results</title>
		<link>https://xnftcrypto.com/what-has-anonymous-done-to-russia-here-are-the-results/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-has-anonymous-done-to-russia-here-are-the-results</link>
					<comments>https://xnftcrypto.com/what-has-anonymous-done-to-russia-here-are-the-results/#respond</comments>
		
		<dc:creator><![CDATA[xnftcrypto]]></dc:creator>
		<pubDate>Wed, 16 Mar 2022 05:35:13 +0000</pubDate>
				<category><![CDATA[Investment]]></category>
		<category><![CDATA[Anonymous]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[business news]]></category>
		<category><![CDATA[Catastrophe]]></category>
		<category><![CDATA[Commonwealth of Independent States]]></category>
		<category><![CDATA[Computer crime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Economy]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Russia Today]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Twitter Inc]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">https://xnftcrypto.com/what-has-anonymous-done-to-russia-here-are-the-results/</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="2560" height="1707" src="https://xnftcrypto.com/wp-content/uploads/2022/03/What-has-Anonymous-done-to-Russia-Here-are-the-results-scaled.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://xnftcrypto.com/wp-content/uploads/2022/03/What-has-Anonymous-done-to-Russia-Here-are-the-results-scaled.jpeg 2560w, https://xnftcrypto.com/wp-content/uploads/2022/03/What-has-Anonymous-done-to-Russia-Here-are-the-results-300x200.jpeg 300w, https://xnftcrypto.com/wp-content/uploads/2022/03/What-has-Anonymous-done-to-Russia-Here-are-the-results-1024x683.jpeg 1024w, https://xnftcrypto.com/wp-content/uploads/2022/03/What-has-Anonymous-done-to-Russia-Here-are-the-results-768x512.jpeg 768w, https://xnftcrypto.com/wp-content/uploads/2022/03/What-has-Anonymous-done-to-Russia-Here-are-the-results-1536x1024.jpeg 1536w, https://xnftcrypto.com/wp-content/uploads/2022/03/What-has-Anonymous-done-to-Russia-Here-are-the-results-2048x1365.jpeg 2048w" sizes="auto, (max-width: 2560px) 100vw, 2560px" /></div>
<p>[ad_1] More than three weeks ago, a popular Twitter account named &#8220;Anonymous&#8221; declared that the shadowy activist group was waging a &#8220;cyber war&#8221; against Russia. Since then, the account — which has more than 7.9 million followers, with some 500,000 gained since Russia&#8217;s invasion of Ukraine — has claimed responsibility for disabling prominent Russian government, [&#8230;]</p>
<p>The post <a href="https://xnftcrypto.com/what-has-anonymous-done-to-russia-here-are-the-results/">What has Anonymous done to Russia? Here are the results</a> appeared first on <a href="https://xnftcrypto.com">Exchange NFT &amp; CRYPTO</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="2560" height="1707" src="https://xnftcrypto.com/wp-content/uploads/2022/03/What-has-Anonymous-done-to-Russia-Here-are-the-results-scaled.jpeg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://xnftcrypto.com/wp-content/uploads/2022/03/What-has-Anonymous-done-to-Russia-Here-are-the-results-scaled.jpeg 2560w, https://xnftcrypto.com/wp-content/uploads/2022/03/What-has-Anonymous-done-to-Russia-Here-are-the-results-300x200.jpeg 300w, https://xnftcrypto.com/wp-content/uploads/2022/03/What-has-Anonymous-done-to-Russia-Here-are-the-results-1024x683.jpeg 1024w, https://xnftcrypto.com/wp-content/uploads/2022/03/What-has-Anonymous-done-to-Russia-Here-are-the-results-768x512.jpeg 768w, https://xnftcrypto.com/wp-content/uploads/2022/03/What-has-Anonymous-done-to-Russia-Here-are-the-results-1536x1024.jpeg 1536w, https://xnftcrypto.com/wp-content/uploads/2022/03/What-has-Anonymous-done-to-Russia-Here-are-the-results-2048x1365.jpeg 2048w" sizes="auto, (max-width: 2560px) 100vw, 2560px" /></div><p> [ad_1]<br />
</p>
<div id="RegularArticle-ArticleBody-5" data-module="ArticleBody" data-test="articleBody-2" data-analytics="RegularArticle-articleBody-5-2"><span class="HighlightShare-hidden" style="top:0;left:0"/></p>
<div class="group">
<p>More than three weeks ago, a popular Twitter account named &#8220;Anonymous&#8221; declared that the shadowy activist group was waging a &#8220;cyber war&#8221; against Russia.</p>
<p>Since then, the account — which has more than 7.9 million followers, with some 500,000 gained since Russia&#8217;s invasion of Ukraine — has claimed responsibility for disabling prominent Russian government, news and corporate websites and leaking data from entities such as Roskomnadzor, the federal agency responsible for censoring Russian media.</p>
<p>But is any of that true?</p>
<p>It appears it is, says Jeremiah Fowler, a co-founder of the cybersecurity company Security Discovery, who worked with researchers at the web company Website Planet to attempt to verify the group&#8217;s claims.</p>
<p>&#8220;Anonymous has proven to be a very capable group that has penetrated some high value targets, records and databases in the Russian Federation,&#8221; he wrote in a report summarizing the findings.  </p>
</div>
<h2 class="ArticleBody-subtitle">Hacked databases</h2>
<div class="group">
<p>Of 100 Russian databases that were analyzed, 92 had been compromised, said Fowler.</p>
<p>They belonged to retailers, Russian internet providers and intergovernmental websites, including the Commonwealth of Independent States, or CIS, an organization made up of Russia and other former Soviet nations that was created in 1991 following the fall of the Soviet Union.</p>
<p>Many CIS files were erased, hundreds of folders were renamed to &#8220;putin_stop_this_war&#8221; and email addresses and administrative credentials were exposed, said Fowler, who likened it to 2020&#8217;s malicious &#8220;MeowBot&#8221; attacks, which &#8220;had no purpose except for a malicious script that wiped out data and renamed all the files.&#8221;</p>
</div>
<div class="group">
<p>Another hacked database contained more than 270,000 names and email addresses.</p>
<p>&#8220;We know for a fact that hackers found and probably accessed these systems,&#8221; said Fowler. &#8220;We do not know if data was downloaded or what the hackers plan to do with this information.&#8221;</p>
<p>Other databases contained security information, internal passwords and a &#8220;very large number&#8221; of secret keys, which unlock encrypted data, said Fowler.</p>
<p>As to whether this was the work of Anonymous, Fowler said he followed Anonymous&#8217; claims &#8220;and the timeline matches perfect,&#8221; he said.</p>
</div>
<h2 class="ArticleBody-subtitle">Hacked TV broadcasts and websites</h2>
<div class="group">
<p>The Twitter account, named @YourAnonNews, has also claimed to have hacked into Russian state TV stations.</p>
<p>&#8220;I would mark that as true if I were a factchecker,&#8221; said Fowler. &#8220;My partner at Security Discovery, Bob Diachenko, actually captured a state news live feed from a website and filmed the screen, so we were able to validate that they had hacked at least one live feed [with] a pro-Ukrainian message in Russian.&#8221;</p>
</div>
<div class="InlineImage-imageEmbed" id="ArticleBody-InlineImage-107031088" data-test="InlineImage">
<div class="InlineImage-wrapper">
<div>
<p>The English-language Russian news website RT &#8220;is for a western audience, and so what what&#8217;s being shown on RT is not what&#8217;s being told in Russia,&#8221; said Security Discovery&#8217;s Jeremiah Fowler.</p>
<p>Lionel Bonaventure | AFP | Getty Images</p>
</div>
</div>
</div>
<div class="group">
<p>The account has also claimed to have disrupted websites of major Russian organizations and media agencies, such as the energy company Gazprom and state-sponsored news agency RT.</p>
<p>&#8220;Many of these agencies have admitted that they were attacked,&#8221; said Fowler.</p>
<p>He called denial of service attacks — which aim to disable websites by flooding them with traffic — &#8220;super easy.&#8221; Those websites, and many others, have been shuttered at various points in recent weeks, but they are also reportedly being targeted by other groups as well, including some 310,000 digital volunteers who have signed up for the &#8220;IT Army of Ukraine&#8221; Telegram account.   </p>
</div>
<h2 class="ArticleBody-subtitle">False claims by other groups</h2>
<div class="group">
<p>Fowler said he didn&#8217;t find any instances where Anonymous had overstated its claims.</p>
<p>But that is happening with other hacktivist groups, said Lotem Finkelstein, head of threat intelligence and research at the cybersecurity company Check Point Software Technologies.</p>
<p>In recent weeks, a pro-Ukrainian group claimed it breached a Russian nuclear reactor, and a pro-Russian group said it shut down Anonymous&#8217; website. Check Point concluded both claims were false.</p>
<p>&#8220;As there is no real official Anonymous website, this attack … appears to be more of a morale booster for the pro-Russian side, and a publicity event,&#8221; CPR said, a fact which did not go unnoticed by Anonymous affiliates, who mocked the claim on social media. </p>
<p><span/></p>
<p>Groups are making fake claims by posting old or publicly available information to gain popularity or glory, said Finkelstein.</p>
<p>Fowler said he feels Anonymous is, however, dedicated more to the &#8220;cause&#8221; than to notoriety.</p>
<p>&#8220;In what I saw in these databases, it was more about the messaging than saying &#8216;hey, you know, Anonymous troop No. 21, group five, did this,'&#8221; he said. &#8220;It was more about the end result.&#8221;</p>
</div>
<h2 class="ArticleBody-subtitle">A cyber &#8216;Robin Hood&#8217;</h2>
<div class="group">
<p>Hacktivists who conduct offensive cyber warfare-like activities without government authority are engaging in criminal acts, said Paul de Souza, the founder of the non-profit Cyber Security Forum Initiative.</p>
<p>Despite this, many social media users are cheering Anonymous&#8217; efforts on, with many posts receiving thousands of likes and messages of support.</p>
<p>&#8220;They&#8217;re almost like a cyber Robin Hood, when it comes to causes that people really care about, that no one else can really do anything about,&#8221; said Fowler. &#8220;You want action now, you want justice now, and I think groups like Anonymous and hacktivists give people that immediate satisfaction.&#8221;</p>
<p>Many hacktivist groups have strong values, said Marianne Bailey, a cybersecurity partner at the consulting firm Guidehouse and former cybersecurity executive with the U.S. National Security Agency. Cyber activism is a low-cost way for them to influence governmental and corporate actions, she said.</p>
<p>&#8220;It is protesting in the 21st century,&#8221; said Bailey.  </p>
</div>
<div class="group">
<p>Yet cheering them on can be dangerous in the &#8220;fog of war,&#8221; she said.</p>
<p>&#8220;A cyberattack has the potential for such an immediate impact, in most cases well before any accurate attribution can be determined,&#8221; she said. &#8220;A cyber strike back or even kinetic strike back could be directed to the wrong place. And what if that misattribution is intentional? What if someone makes the attack appear from a specific country when that&#8217;s not true?&#8221;</p>
<p>She said cyber warfare can be cheaper, easier, more effective and easier to deny than traditional military warfare, and that it will only increase with time.</p>
<p>&#8220;With more devices connected to this global digital ecosystem the opportunity for impact continues to expand,&#8221; she said. &#8220;It will undoubtedly be used more often in future conflicts.&#8221;</p>
</div>
</div>
<p>[ad_2]<br />
<br /><a href="https://www.cnbc.com/2022/03/16/what-has-anonymous-done-to-russia-here-are-the-results-.html">Source link </a></p>
<p>The post <a href="https://xnftcrypto.com/what-has-anonymous-done-to-russia-here-are-the-results/">What has Anonymous done to Russia? Here are the results</a> appeared first on <a href="https://xnftcrypto.com">Exchange NFT &amp; CRYPTO</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://xnftcrypto.com/what-has-anonymous-done-to-russia-here-are-the-results/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
