Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Google Shares Data on State-Sponsored Hacking Attempts

Google’s Threat Analysis Group (TAG) this week shared some data on government-backed hacking and disinformation attempts targteting its customers.

Google’s Threat Analysis Group (TAG) this week shared some data on government-backed hacking and disinformation attempts targteting its customers.

Google has been alerting users of state-sponsored hacking attempts for several years and it has sent out thousands of warnings every month.

In a blog post published on Tuesday, Shane Huntley of Google TAG revealed that more than 12,000 warnings triggered by state-sponsored phishing attempts were sent out to users across 149 countries in the third quarter of 2019. The company says the number of warnings has remained roughly the same as it was in the same period of 2017 and 2018.

The United States was the number one target of these types of attempts in the third quarter of 2019, followed by Pakistan.

Distribution of government-backed phishing targets in Q3 (Jul-Sep 2019)

Over 90 percent of these attacks involved attempts to convince users to hand over their account credentials, including two-factor authentication codes, which would allow the attacker to take control of the targeted account.

Google provides a service named Advanced Protection Program (APP), which high-risk users such as journalists and rights activists can leverage to better protect their accounts through the use of hardware security keys.

Google’s TAG has been monitoring the activities of over 270 threat groups that have launched targeted attacks or government-backed campaigns. Their operations have been aimed at entities in more than 50 countries, and their goal was mainly to gather intelligence, steal intellectual property, launch destructive attacks, track activists and dissidents, or spread false information.

One of these groups is the Russia-linked Sandworm, which in the past years uploaded or attempted to upload several malicious Android apps to the Google Play Store. Some of these applications targeted users in South Korea and Ukraine.

Advertisement. Scroll to continue reading.

As for the disinformation campaigns it has targeted recently, Google mentioned a Russia-linked influence operation aimed at several countries in Africa, and a campaign targeting Indonesia’s Papua and West Papua provinces.

Related: Google Took Down 2.3 Billion Bad Ads in 2018

Related: Google Warns Users of Recent State-sponsored Attacks

Related: Google Offers G Suite Alerts for State-Sponsored Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...