Chinese spies spent months inside aerospace engineering firm’s network via legacy IT

Chinese spies spent months inside aerospace engineering firm's network via legacy IT

September 18, 2024 at 01:08PM

Chinese state-sponsored spies breached a global engineering firm’s network using default credentials on an IBM AIX server. The espionage, attributed to a People’s Republic of China team, aimed for intellectual property theft and supply-chain manipulation. Despite exposure to local and federal agencies, the intruders established persistent access before getting caught, prompting the firm to improve security measures.

From the meeting notes, I have gathered the following key takeaways:

– Chinese state-sponsored spies gained initial entry into a global engineering firm’s network using default credentials on an IBM AIX server.
– The intrusion was detected after the spies established persistent access and uploaded a web shell, giving them full remote access to the IT network.
– The firm detected the intrusion, removed the spies from the environment, and worked with government cybersecurity officials on attribution and mitigation.
– The spies attempted to gather intelligence, conduct NTLM relay attacks, and dump memory from a Windows server before being discovered and removed from the network.
– After being removed, another attack, attributed to the same group, occurred within 24 hours.
– The incident highlights the risk associated with legacy IT systems and the importance of backward compatibility with newer security tools.
– Binary Defense is preparing to publish a report on the cyber-break-in and important lessons learned from the incident.

Full Article