{"id":345,"date":"2020-07-21T14:28:59","date_gmt":"2020-07-21T14:28:59","guid":{"rendered":"https:\/\/www.new.try2ascend.com\/wp\/?p=345"},"modified":"2023-03-11T12:37:56","modified_gmt":"2023-03-11T12:37:56","slug":"china-a-leader-in-vulnerability-exploitation","status":"publish","type":"post","link":"https:\/\/try2ascend.com\/cyberware\/china-a-leader-in-vulnerability-exploitation\/","title":{"rendered":"China- A Leader In Vulnerability Exploitation"},"content":{"rendered":"\r\n<p>Be it the security teams working for the government or businesses or be it the companies that provide Cybersecurity as a service, it has been difficult to be in this game and come out unaffected. Since the beginning of 2020, the enormous disruption caused by Covid, it has been a harsh time for those who are in the process of stopping cyberattacks from China.<\/p>\r\n<h1>What has China done to become a Leader in Vulnerability Exploitation?<\/h1>\r\n<p>China deployed vulnerability exploits at a much higher rate in 2021 compared to 2020.\u00a0The\u00a0infamous Wicked Panda\u00a0along with other China\u2019s cyber threat actors had published two vulnerabilities in 2020 named\u00a0CVE-2020-14882 (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Oracle_WebLogic_Server\" rel=\"noopener\">Oracle WebLogic<\/a>) and CVE-2020-10189 (Zoho ManageEngine).\u00a0<\/p>\r\n<p>China vulnerability exploitation 2021\u00a0statistics suggested 12 exploitation of vulnerabilities published in 2021 which affected nine products, meaning 6 times increment in exploitation when compared to\u00a0China vulnerability exploitation 2020<strong>.\u00a0<\/strong><\/p>\r\n<p>In the past, Chinese malicious actors had exploited vulnerabilities through user interaction. These explorations came under the guise of important documents or other files attached to emails. They also exploited through websites that hosted malicious code, all they needed was to be visited once by the user.\u00a0<\/p>\r\n<p>In 2021, Chinese hackers started deploying their exploits with a complete focus on vulnerabilities that were found in internet facing devices and services. A much more sophisticated manner of cyberattacks from China used a series of vulnerabilities called\u00a0ProxyLogon and ProxyShell\u00a0in Microsoft Exchange. These vulnerabilities allowed the hackers to launch brazen data breaches in organizations worldwide.\u00a0\u00a0<\/p>\r\n<h2>How is China emerging as a Cyberpower?<\/h2>\r\n<p>China as an emerging cyberpower exploited VPNs and routers for acquiring infrastructure and initial access. These hackers have been exploiting various products for initial access including GitLab.1, Atlassian Confluence, and Zoho ManageEngine.<br \/>Sophisticated cyberattacks and malicious activities carried out by China in 2021 have brought forward a high range of exploitation and acquisition capabilities. The CrowdStrike threat report shows that within the community of Chinese hackers, the Tianfu Cup hacking competition has presented a noteworthy talent of exploitation development.<\/p>\r\n<h3>What lesson should we learn from Cyberattacks?<\/h3>\r\n<p>Cyberattacks like these help us understand that in today&#8217;s world, not being protective enough of your system infrastructure and implementing the right cybersecurity solutions in place can lead to a massive loss. Not just financial loss, but the loss of data which can become a major cause of losing your company\u2019s reputation and trust. Small to medium sized enterprises (SMEs) get affected by such cyberattacks to an extent that bouncing back becomes an unachievable task. For enterprises like these, there are offshore services offered by Cybersecurity companies. One of such companies is Cyberware.AI.<\/p>\r\n<p><a href=\"https:\/\/www.cyberware.ai\/\" rel=\"noopener\">Cyberware.AI<\/a>\u00a0understands your specific cybersecurity needs and offers sophisticated tools and technical expertise to protect your company from cyber threats. From\u00a0<a href=\"https:\/\/www.cyberware.ai\/vulnerability-assessment\/\" rel=\"noopener\">vulnerability assessment<\/a>\u00a0to\u00a0<a href=\"https:\/\/www.cyberware.ai\/vulnerability-management\/\" rel=\"noopener\">vulnerability management<\/a>, it offers all the services you need along with security awareness training.<br \/><br \/>To know more about the services offered by Cyberware.AI, you can email at: info@cyberware.ai<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><\/figure>","protected":false},"excerpt":{"rendered":"<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolorer<\/p>\n","protected":false},"author":1,"featured_media":1268,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18,20],"tags":[21,22,23,24],"class_list":["post-345","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-crime","category-security","tag-blockchain","tag-cyber-security","tag-cybercrime","tag-global-news"],"acf":[],"_links":{"self":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/posts\/345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/comments?post=345"}],"version-history":[{"count":0,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/posts\/345\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/media\/1268"}],"wp:attachment":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/media?parent=345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/categories?post=345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/tags?post=345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}