<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>china on</title><link>https://aes-security.netlify.app/tags/china/</link><description>Recent content in china on</description><generator>Hugo -- gohugo.io</generator><lastBuildDate>Tue, 04 Oct 2022 09:19:42 +0100</lastBuildDate><atom:link href="https://aes-security.netlify.app/tags/china/index.xml" rel="self" type="application/rss+xml"/><item><title>APT41</title><link>https://aes-security.netlify.app/blog/apt41/</link><pubDate>Tue, 04 Oct 2022 09:19:42 +0100</pubDate><guid>https://aes-security.netlify.app/blog/apt41/</guid><description>APT41 is a Chinese state-sponsored espionage group that also conducts financially-motivated operations. Active since at least 2012, APT41 has been observed targeting healthcare, telecom, technology, and video game industries in 14 countries.
APT41 is highly persistent with its attacks. The group attacked a single target with 150 unique pieces of malware for a year long. They're also able to respond quickly to changes in victim environments. When suspicious activity is noticed and they get kicked from a system, they are able to make their way back in.</description></item></channel></rss>