Tomcat

Search documents
美方利用微软Exchange漏洞攻击我军工企业,窃取企业高层的邮件!详情披露
Mei Ri Jing Ji Xin Wen· 2025-08-01 03:29
Core Viewpoint - The article highlights the increasing frequency and sophistication of cyberattacks by U.S. intelligence agencies targeting China's high-tech military and defense sectors, posing significant threats to national security and research production safety [1][4]. Group 1: Cyberattack Incidents - In a notable incident from July 2022 to July 2023, U.S. intelligence exploited a zero-day vulnerability in Microsoft Exchange to attack a major military enterprise, gaining control of its email server for nearly a year and compromising over 50 critical devices [1][2]. - The attackers utilized multiple foreign IP addresses from countries such as Germany, Finland, South Korea, and Singapore to execute over 40 attacks, stealing emails from 11 individuals, including high-ranking officials, related to military product designs and core system parameters [2]. - Another incident from July to November 2024 involved attacks on a military communications and satellite internet enterprise, where attackers exploited unauthorized access and SQL injection vulnerabilities to implant backdoor programs and malware, compromising over 300 devices and targeting sensitive data [3]. Group 2: Threat Landscape - In 2024 alone, there were over 600 cyberattack incidents against important Chinese entities by foreign state-level APT organizations, with the defense and military sectors being the primary targets [4]. - U.S. intelligence-backed hacker organizations are characterized by their structured attack teams, extensive engineering support systems, and advanced vulnerability analysis capabilities, posing severe threats to China's critical information infrastructure and key personnel [4].