За даними «Медіазони» рішення про заочний арешт було ухвалене ще 4 березня, проте про нього досі не було відомо
…
Beijing, China — China has intensified efforts to block software that enables internet users to access banned websites during a top political meeting this week, a leading provider of firewall-leaping software told AFP.
Beijing operates some of the world’s most extensive censorship over the internet, with web users in mainland China unable to access everything from Google to news websites without using a virtual private network (VPN).
And as thousands of delegates gather in Beijing this week for the annual “Two Sessions” meeting, VPN software has increasingly struggled to circumvent the censorship while outages have become much more frequent, even when compared to previous sensitive political events.
“Currently, there is increased censorship due to political meetings in China,” a representative of the Liechtenstein-based service Astrill — one of the most popular VPN services for foreigners in China — confirmed to AFP.
“Unfortunately, not all VPN protocols are functioning at this time,” they said. “We are working intensively on bringing all services back to normal, but currently have no ETA.”
The use of a VPN without government authorization is illegal in China, as is using the software to access blocked websites.
State media workers and diplomats, however, are allowed to access prohibited websites such as X, formerly Twitter.
Security has tightened across Beijing throughout the Two Sessions, with security officers patrolling streets with sniffer dogs and elderly volunteers in red armbands monitoring pedestrians for suspicious behavior.
Chinese social media giant Weibo has also been quick to block sensitive topics.
All hashtags discussing Beijing’s decision to call off a traditional news conference by the country’s premier were quickly removed from search results.
And another, a reference to China’s economic woes declaring “middle class children have no future” was also removed.
China’s domestic media is state-controlled and widespread censorship of social media is often used to suppress negative stories or critical coverage.
Regulators have previously urged investors to avoid reading foreign news reports about China.
In a speech last year, President Xi Jinping said the ruling Communist Party’s control of the internet had been “strengthened,” and that it was crucial that the state “govern cyberspace.”
…
BOSTON, MASSACHUSETTS — Microsoft said Friday it’s still trying to evict the elite Russian government hackers who broke into the email accounts of senior company executives in November and who it said have been trying to breach customer networks with stolen access data.
The hackers from Russia’s SVR foreign intelligence service used data obtained in the intrusion, which Microsoft disclosed in mid-January, to compromise some source-code repositories and internal systems, the software giant said in a blog and a regulatory filing.
A company spokesperson would not characterize what source code was accessed and what capability the hackers gained to further compromise customer and Microsoft systems. Microsoft said Friday that the hackers stole “secrets” from email communications between the company and unspecified customers — cryptographic secrets such as passwords, certificates and authentication keys — and that it was reaching out to them “to assist in taking mitigating measures.”
Cloud-computing company Hewlett Packard Enterprise disclosed on January 24 that it, too, was an SVR hacking victim and that it had been informed of the breach — by whom it would not say — two weeks earlier, coinciding with Microsoft’s discovery it had been hacked.
“The threat actor’s ongoing attack is characterized by a sustained, significant commitment of the threat actor’s resources, coordination and focus,” Microsoft said Friday, adding that it could be using obtained data “to accumulate a picture of areas to attack and enhance its ability to do so.”
Cybersecurity experts said Microsoft’s admission that the SVR hack had not been contained exposes the perils of the heavy reliance by government and business on the Redmond, Washington, company’s software monoculture — and the fact that so many of its customers are linked through its global cloud network.
“This has tremendous national security implications,” said Tom Kellermann of the cybersecurity firm Contrast Security. “The Russians can now leverage supply chain attacks against Microsoft’s customers.”
Amit Yoran, the CEO of Tenable, also issued a statement, expressing alarm and dismay. He is among security professionals who find Microsoft overly secretive about its vulnerabilities and how it handles hacks.
“We should all be furious that this keeps happening,” Yoran said. “These breaches aren’t isolated from each other, and Microsoft’s shady security practices and misleading statements purposely obfuscate the whole truth.”
Microsoft said it had not yet determined whether the incident is likely to materially affect its finances. It also said the intrusion’s stubbornness “reflects what has become more broadly an unprecedented global threat landscape, especially in terms of sophisticated nation-state attacks.”
The hackers, known as Cozy Bear, are the same hacking team behind the SolarWinds breach.
When it initially announced the hack, Microsoft said the SVR unit broke into its corporate email system and accessed accounts of some senior executives as well as employees on its cybersecurity and legal teams. It would not say how many accounts were compromised.
At the time, Microsoft said it was able to remove the hackers’ access from the compromised accounts on or about January 13. But by then, they clearly had a foothold.
It said they got in by compromising credentials on a “legacy” test account but never elaborated.
Microsoft’s latest disclosure comes three months after a new U.S. Securities and Exchange Commission rule took effect that compels publicly traded companies to disclose breaches that could negatively affect their business.
…