Chinese Cyber Attack on The Philippines


     Chinese Cyber Attack on The Philippines, as the world knows, China has been doing a lot of espionage of recent times. Here at Codex Shopper, we want to inform you of the possible attacks, how it’s done and what you have to do to keep your information safe, be it your bank accounts, social media passwords, sensitive personal information. He’s the 1 2 and 3 of guarding against these so called attacks.


     Cybersecurity experts have detected a “rare and wide-scale” advanced persistent threat (APT) drive by Chinese “actors” against users in Southeast Asia, especially in the Philippines and Myanmar.

Ma. Alena O. Castillo

What Sort of Attack is this?

     Since Oct 2020, the attack has been going after government entities but that’s not the limit of these attacks. One of the rules of espionage is information is power, no matter how meager it may be, you never know when it might come in handy someday.

Where can you Find these Attacks?

     We’re talking about the internet here, where a simple click on a malicious link can lead you to your ruin, specially the setup right now where almost all of us have to work from home. So below we’ve rooted out the most possible ways that these attacks can spread even to your personal computer or your company issued computers.

  • Malicious links being sent to your Email – Having said that, it won’t be easy detecting these links via internet tools, they might use a Gmail account or other forms of trusted email services you can create for free.
  • Photos – The email they send you might be in the form of a brochure or a gallery and behind those photos isn’t a website but a link opting for download.
  • Known Applications  – There have been reports of a signed fake Zoom being used as well to do these attacks, meaning the application might have the Zoom icon and such. To be honest if it’s a Zoom icon you won’t think much about it other than being a form of application to communicate with.
  • RAR – RAR is a smushed in repacked software that you often get in installers.
  • Dropbox Download Link –  The links you often see when downloading files from the internet.
  • Flash Drives – Last but not the least, the traditional drives, there are such drives with an auto run kind of automation inside that instantly installs the program stored within.

What do these Attacks do to your PC?

     The general classification of these attacks is a Malware or Malicious Software. For example you received an email out of the blue and you just clicked on the link they gave you or something like that, if the malware finds a drive, it then creates hidden directories where it then transfers the data of the victim and all of it’s other components.

The malware also has two points that would really alarm you. The first one is the aforementioned signed fake Zoom application and the other one steals Cookies from your Chrome Browser. It could mean your passwords or links that you brows for work or your investments, they’d all be at risk. And if you think this is a laughing matter the Philippines already has around 1,400 confirmed attacks. Now try to think of the number of the unconfirmed ones.

How to Avoid these Malicious Attacks

     Jobs are hard right now but some of us still work through these trying times. As mentioned from this article above, almost all of us are working at home right now, we don’t have an I.T staff standing by if our PC does something funny. So we’ve compiled the easiest ways to avoid being victimized by these said attacks.

  1. Don’t click on anything you don’t trust.
  2. Just because it’s pretty doesn’t mean it needs to be clicked or liked.
  3. If you didn’t subscribe to anything then it’s not meant to be clicked.
  4. Don’t experiment if you don’t know what you’re doing.
  5. If you know it’s a malicious email, there’s always the option of blocking the email address that sent it to you.
  6. Only download software on trusted websites.
  7. Make it a habit to change your passwords every 2 months or every month for that matter.
  8. Don’t input any sensitive information on any website promising great rewards if you place personal info onto them.

Article Reference: Philstar

Share on facebook
Share on twitter
Share on linkedin
Share on telegram

Leave a Reply