Hafnium (kelompok mata-mata siber): Perbedaan antara revisi
Konten dihapus Konten ditambahkan
k Menambah Kategori:Peristiwa 2021 menggunakan HotCat |
Rescuing 5 sources and tagging 0 as dead.) #IABot (v2.0.9.5 |
||
(4 revisi perantara oleh 3 pengguna tidak ditampilkan) | |||
Baris 1:
{{Untuk|unsur kimia|Hafnium}}
'''Hafnium''' (kadang ditulis '''HAFNIUM''') merupakan sebuah kelompok mata-mata siber, yang kadang dikenal sebagai ancaman terus-menerus, yang dianggap berhubungan erat dengan [[Tiongkok]].<ref name="BBC">{{Cite news|date={{date|3 March 2021}}|title=Microsoft accuses China over email cyber-attacks|language=en-GB|work=[[BBC News]]|url=https://www.bbc.com/news/business-56261516|url-status=live|access-date={{date|10 March 2021}}|archive-date=2021-07-22|archive-url=https://web.archive.org/web/20210722050937/https://www.bbc.com/news/business-56261516|dead-url=no}}</ref><ref name=":2">{{Cite news|last=Kevin|first=Collier|date={{date|9 March 2021}}|title='Really messy': Why the hack of Microsoft's email system is getting worse|work=[[NBC News]]|url=https://www.nbcnews.com/tech/security/really-messy-hack-microsofts-email-system-getting-worse-rcna377|url-status=live|access-date={{date|10 March 2021}}|language=en|archive-date=2021-07-22|archive-url=https://web.archive.org/web/20210722045436/https://www.nbcnews.com/tech/security/really-messy-hack-microsofts-email-system-getting-worse-rcna377|dead-url=no}}</ref><ref name="Microsoft-HAFNIUM">{{Cite web|date={{date|2 March 2021}}|title=HAFNIUM targeting Exchange Servers with 0-day exploits|url=https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/|url-status=live|access-date={{date|10 March 2021}}|website=Microsoft Security|publisher=[[Microsoft]]|language=en-US|archive-date=2021-07-24|archive-url=https://web.archive.org/web/20210724073915/https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/|dead-url=no}}</ref> Microsoft menamai Hafnium sebagai kelompok yang bertanggung jawab pada [[kebobolan data Microsoft Exchange Server 2021]], yang diduga "didanai dan beroperasi di luar Tiongkok".<ref name=":2" /><ref name="Microsoft-HAFNIUM" /> Menurut Microsoft, mereka berbasis di Tiongkok tetapi menggunakan [[jaringan pribadi virtual]] di Amerika Serikat.<ref>{{Cite web|last=Burt|first=Tom|date={{date|2 March 2021}}|title=New nation-state cyberattacks|url=https://blogs.microsoft.com/on-the-issues/2021/03/02/new-nation-state-cyberattacks/|url-status=live|access-date={{date|10 March 2021}}|website=Microsoft On the Issues|publisher=[[Microsoft]]|language=en-US|archive-date=2021-03-02|archive-url=https://web.archive.org/web/20210302211855/https://blogs.microsoft.com/on-the-issues/2021/03/02/new-nation-state-cyberattacks/|dead-url=no}}</ref> Penyelidik luar Microsoft belum memverifikasi identitas atau motif kelompok tersebut dalam menjalankan aktivitas tersebut.<ref name="Greenberg-Wired">{{Cite news|last=Greenberg|first=Andy|author-link=|date={{date|5 March 2021}}|title=Chinese Hacking Spree Hit an ‘Astronomical’ Number of Victims|language=en-us|work=Wired|url=https://www.wired.com/story/china-microsoft-exchange-server-hack-victims/|url-status=live|access-date={{date|10 March 2021}}|issn=1059-1028|archive-date=2021-05-26|archive-url=https://web.archive.org/web/20210526020723/https://www.wired.com/story/china-microsoft-exchange-server-hack-victims/|dead-url=no}}</ref> Tiongkok menyanggah keterlibatannya dalam kasus bobolnya data Microsoft 2021.<ref name=":2" />
== Referensi ==
{{reflist}}
{{Peretasan pada tahun 2020-an}}
[[Kategori:Peristiwa 2021]]
{{org-stub}}
|