• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

AllTech.News

Google Issues Customers 50,000+ Warnings of State-Backed Attacks

You are here: Home / Cyber Security News / Google Issues Customers 50,000+ Warnings of State-Backed Attacks

Google has seen a 33% calendar year-on-year spike in country condition tries to compromise its buyers so much in 2021, the tech big revealed yesterday.

Security engineer Ajax Bash claimed that in the 12 months-to-day, Google’s Risk Evaluation Group (TAG) experienced sent more than 50,000 warnings to shoppers that their account was the target of government-backed phishing or malware attempts.

The most important explanation for the raise in attacks was an “unusually large” campaign attributed to the infamous Kremlin-backed actor regarded as Fancy Bear (APT28).

“We deliberately send out these warnings in batches to all buyers who may well be at risk, relatively than at the second we detect the danger by itself, so that attackers cannot track our protection techniques,” Bash explained.

“On any given day, TAG is monitoring far more than 270 qualified or federal government-backed attacker groups from far more than 50 international locations. This signifies that there is ordinarily more than one threat actor behind the warnings.”

The news follows a similar update from Microsoft final week in which the tech giant disclosed that Russia accounted for the vast majority (58%) of alerts it despatched shoppers around the earlier calendar year. APT29 (Cozy Bear) created the wide the vast majority (92%) of these notifications.

Microsoft explained it had sent about 20,000 alerts relating to country-state assaults, considerably less than Google’s tally around the earlier a few years.

Google has been sending out these warnings for nearly a ten years now and has an Advanced Protection Program for people who think they may be a important goal, such as journalists and rights activists.

Also, in the website publish, Bash comprehensive the latest campaign from Iranian state group APT35, which tried using previous 12 months to disrupt the US election by concentrating on Presidential marketing campaign staff members.

A single of its attempted-and-tested strategies is to compromise genuine web pages with phishing kits and send out email messages to targets with links to people web pages. It’s also been observed uploading spyware concealed in ordinary-seeming VPN software package on Google Play.

Some parts of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: « Clubhouse has a new high-quality audio option for musicians
Next Post: Former Boeing chief technical pilot involved in 737 Max testing charged with fraud »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © 2025 · AllTech.News, All Rights Reserved.