Southeast Asia and India are the target of cyber espionage campaign by the Chinese government.
A new intelligence report released by FireEye indicates that this region is hit by an advanced persistent threat (APT) group called APT 30.
APT 30 is conducting cyber espionage for about a decade now and is one of the longest operating APT groups that FireEye tracks.
Since 2005, this group has launched cyber attacks in Southeast Asia and India, including targets in Malaysia, Vietnam, Thailand, Nepal, Singapore, Philippines and Indonesia.
"Advanced threat group like APT 30 illustrate that state-sponsored cyber espionage affects a variety of governments and corporations across the world," said Dan McWhorter, VP of threat intelligence, FireEye.
APT 30's attack tools, tactics, and procedures (TTPs) were very consistent since the group began its attacks ten years ago.
FireEye's intelligence report shows that most APT actors adjust their TTPs regularly so that they are not caught. This group uses a methodical approach to develop malware similar to that of established technology businesses.
Malware developed is used for security breaches in several diplomatic, political, media and private-sector environments.
All these attacks help the Chinese government to gain information about several regional political, economic, and military issues in Southeast Asia.
The Chinese government also gets information about disputed territories, and discussions related to the legitimacy of the Chinese Communist Party.
"Given the consistency and success of APT 30 in Southeast Asia and India, the threat intelligence on APT 30 we are sharing will help empower the region's governments and businesses to quickly begin to detect, prevent, analyze and respond to this established threat," added McWhorter.
Sign up for CIO Asia eNewsletters.