Report identifies location and tactics of Chinese cyber espionage cell

Online researcher Crowdstrike hopes report will help U.S. hold Chinese government accountable

Despite the multiple vectors that can be used to facilitate a breach, goals remain relatively limited and increasingly revolve around poaching sensitive intellectual property or trade secrets.  Cybercrime has also shown an increased predilection towards being committed by highly organized teams, often backed by governments. In May, the Department of Justice (DOJ) charged five Chinese hackers with associations to the Chinese People’s Liberation Army for stealing information on United States infrastructure. Now less than a month later, a second unit has been caught attempting to take similar pieces of information.

Crowdstrike, a network research organization, released a report on June 9 that says a group named Putter Panda has engaged in repeated attempts to steal information from European and American organizations since 2007.

Executive Editor

author image

Chris DiMarco

Chris DiMarco, Executive Editor of InsideCounsel magazine, has a background in multimedia production with previous involvement in projects in which he developed and created content...

Bio and more articles

Join the Conversation

Advertisement. Closing in 15 seconds.