Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    Jeffrey Epstein might not have created /pol/, but he helped carry out its mission

    Jeffrey Epstein might not have created /pol/, but he helped carry out its mission

    February 12, 2026
    Eufy’s midrange X10 Pro Omni robovac has fallen to its best-ever price

    Eufy’s midrange X10 Pro Omni robovac has fallen to its best-ever price

    February 12, 2026
    El Paso airspace closure was reportedly triggered by the CBP’s use of an anti-drone laser

    El Paso airspace closure was reportedly triggered by the CBP’s use of an anti-drone laser

    February 12, 2026
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Brass Typhoon: The Chinese Hacking Group Lurking in the Shadows
    Security

    Brass Typhoon: The Chinese Hacking Group Lurking in the Shadows

    News RoomBy News RoomApril 14, 20254 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    Brass Typhoon: The Chinese Hacking Group Lurking in the Shadows

    As China continues its digital gambit around the world, researchers are warning that hacking activity from long-tracked groups is evolving and blending together. On top of that, attackers are hiding their campaigns more effectively and blurring the lines between cybercriminals and state-backed hacking.

    Last year, revelations rocked the United States federal government that the Chinese hacking group known as “Salt Typhoon” had breached at least nine major US telecoms. And the group’s rampage even continued into this year in the US and other countries around the world. Meanwhile, the Beijing-linked hacking group “Volt Typhoon” has continued to lurk in US critical infrastructure and utilities around the world. Meanwhile, the notoriously versatile syndicate known as Brass Typhoon—also called APT 41 or Barium—has been operating in the shadows.

    The group, which researchers have been tracking since about 2012, has quietly continued its broad targeting around the world over the past year. Brass Typhoon has cast a wide net, leading researchers to view it as a sort of broad coalition that has attacked everything from a US livestock app to source code and chip designs from Taiwan’s semiconductor industry and even power grids. And over the last year, the group has compromised international institutions in the tech and automotive sectors, materials, shipping and logistics, media, and more, using new and refined malware in an array of sustained campaigns.

    “They’re absolutely still active and still evolving,” says John Hultquist, who leads threat intelligence at the Google-owned cybersecurity firm Mandiant. “But it’s harder to attribute some of this activity than it was in the past, because it’s all part of a much bigger ecosystem of China’s activity which has been deliberately built to create a tremendous amount of capability.”

    Brass Typhoon is known for having carried out a notable string of software supply chain attacks in the late 2010s and for brazen attacks on telecoms around the same time in which the group specifically targeted call record data. The gang is also known for its hybrid activity, carrying out hacks that align with Chinese state-sponsored espionage by the Chinese Ministry of State Security, but also moonlighting on seemingly cybercriminal projects, particularly focused on the video game industry and in-game currency scams.

    Research indicates that Brass Typhoon has continued to be active in recent months with financial crimes targeting online gambling platforms as well as espionage targeting manufacturing and energy firms. Its sustained activity has run in parallel to Salt and Volt Typhoon’s recent, attention-grabbing campaigns, and analysis increasingly shows that China’s state-backed hacking operations must be viewed comprehensively, not just in terms of individual actors.

    “I think we should not get too down the rabbit hole of is it Salt? Is it Flax? Is it Volt?” former US Cybersecurity and Infrastructure Security Agency director Jen Easterly told WIRED during her last days in that role in January, referring to an array of Beijing-linked hacking groups. “At the end of the day, China, as we’ve seen in assessments from the Intelligence Community, is the most formidable, persistent cyber threat that we are dealing with.”

    Hultquist agrees, emphasizing that while tracking the activity of individual groups is still vital, it is increasingly important for defenders to factor in the advantages that state espionage and offensive hacking operations gain from broad collaboration.

    “There was a time when there were very simple indicators that told us who each actor was, and they were operating incredibly loudly, so it was easy to spot the smash-and-grab nature of the activity,” he says. “APT 41 is still doing some loud activity, but so much of its activity now has gotten better and they’ve made an effort to really avoid our controls.”

    Ultimately, though, researchers say that the most significant takeaway about Brass Typhoon’s current activity is that it continues apace.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleWhat Trump’s Tariffs Mean for Tech—and You
    Next Article Samsung pauses One UI 7 rollout worldwide

    Related Posts

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    December 6, 2025
    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    December 5, 2025
    Your Data Might Determine How Much You Pay for Eggs

    Your Data Might Determine How Much You Pay for Eggs

    December 4, 2025
    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    December 4, 2025
    This Hacker Conference Installed a Literal Antivirus Monitoring System

    This Hacker Conference Installed a Literal Antivirus Monitoring System

    December 4, 2025
    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    December 4, 2025
    Our Picks
    Eufy’s midrange X10 Pro Omni robovac has fallen to its best-ever price

    Eufy’s midrange X10 Pro Omni robovac has fallen to its best-ever price

    February 12, 2026
    El Paso airspace closure was reportedly triggered by the CBP’s use of an anti-drone laser

    El Paso airspace closure was reportedly triggered by the CBP’s use of an anti-drone laser

    February 12, 2026
    How Gorilla Tag is weathering the VR winter

    How Gorilla Tag is weathering the VR winter

    February 12, 2026
    Sony’s XM6 earbuds are noise-canceling winners

    Sony’s XM6 earbuds are noise-canceling winners

    February 12, 2026
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    This ,999 robot will fold (some of) your laundry News

    This $7,999 robot will fold (some of) your laundry

    By News RoomFebruary 12, 2026

    If you have a spare $7,999 (plus a $250 deposit), hate folding laundry, and happen…

    Amazon’s Send to Alexa Plus makes the Kindle Scribe feel more like a productivity device

    Amazon’s Send to Alexa Plus makes the Kindle Scribe feel more like a productivity device

    February 12, 2026
    HP ZBook Ultra G1a review: a business-class workstation that’s got game

    HP ZBook Ultra G1a review: a business-class workstation that’s got game

    February 12, 2026
    Ableton Live is adding audio streaming for real-time musical collaboration

    Ableton Live is adding audio streaming for real-time musical collaboration

    February 11, 2026
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2026 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.