6 December 2022

Chinese hackers reportedly stole at least $20M in US Covid benefits


Chinese hackers reportedly stole at least $20M in US Covid benefits

Threat actors working on behalf the Chinese government reportedly have stolen tens of millions of dollars in US Covid relief benefits, including Small Business Administration loans and unemployment insurance funds in over a dozen states, since 2020, the US Secret Service revealed.

The agency has confirmed a report from NBC News that said that the hacker group believed to be behind the thefts is a China-linked threat actor tracked by the cybersecurity community as APT41.

Also known as Barium, Winnti, Wicked Panda, Wicked Spider, Axiom, Lead, or BlackFly, this APT is one of the most prolific state-sponsored groups linked to the Chinese government. Active since at least 2010, the threat actor is believed to be behind malicious campaigns aimed at a wide variety of sectors, including the healthcare, pharmaceutical, telecommunications, and video game industries across multiple countries, including the US, Japan, South Korea, India, Australia, and the UK.

Several members of APT41 were indicted in 2019 and 2020 by the US Department of Justice for spying on over 100 companies, including software development companies, telecommunications providers, social media firms, and video game developers. 

The theft of taxpayer funds by the Chinese hackers is the first instance of pandemic fraud tied to foreign, state-sponsored cybercriminals that the US government has acknowledged publicly, NBC noted. However, the Secret Service did not share the details about the scope of other investigations, saying there are more than 1,000 ongoing investigations involving transnational and domestic criminal actors defrauding public benefits programs, and APT41 is “a notable player.”


Back to the list

Latest Posts

LockBit ransomware leader unmasked, charged and sanctioned in the US, UK, and Australia

LockBit ransomware leader unmasked, charged and sanctioned in the US, UK, and Australia

A Russian threat actor behind the alias 'LockBitSupp' has been identified as Dmitry Khoroshev.
7 May 2024
MITRE hackers deployed Rootrot web shell for initial access

MITRE hackers deployed Rootrot web shell for initial access

The China-linked UNC5221 cluster appears to be behind the hack.
7 May 2024
Suspected Chinese hackers behind ArcaneDoor campaign targeting network devices

Suspected Chinese hackers behind ArcaneDoor campaign targeting network devices

An analysis of the attacker-controlled IP addresses suggests potential involvement of a China-based threat actor.
7 May 2024