Tuesday, July 15, 2025

the executive headlines
logo
  • Home
  • Technology
  • Industry
  • Magazines
  • Our Clients
  • Startup Insights
  • CXOs
  • Leaders Speak
  • Videos
  • News/Blogs
Home

Technology

Industry

Magazines
Our Clients
Startup Insights
CXOs
Leaders Speak
Videos

News/Blogs

Home

Technology

Industry

Magazines
Our Clients
Startup Insights
CXOs
Leaders Speak
Videos

News/Blogs

  1. Home
  2. cyber-security
  3. rising-cyber-threats-storm-2077-and-glassbridge-target-us-institutions
The executive headlines
FacebookInstagramTwitterlinkedinPinterestyoutube

QuickLinks

About UsContact UsReprint & PermissionDisclaimerPrivacy PolicyAdvertise

Latest Magazines

10 Most Visionary Leaders to Watch in 2025
10 Most Influential Business Leaders to Watch in 2025

Subscribe to Our Newsletter

© 2025 The Executive Headlines. All rights reserved.

Rising Cyber Threats: Storm-2077 and GLASSBRIDGE Target U.S. Institutions

Rising Cyber Threats: Storm-2077 and GLASSBRIDGE Target U.S. Institutions

In recent developments, U.S. government agencies and non-governmental organizations have come under increasing cyber threats from a newly identified Chinese state-sponsored actor known as Storm-2077. This emerging threat has been linked to a series of cyber attacks targeting various sectors, including the Defense Industrial Base (DIB), aviation, telecommunications, and financial services globally, as reported by Microsoft.

 

Overview of Storm-2077's Activities

Storm-2077 is believed to have been operational since at least January 2024. Microsoft has indicated that this group has executed cyber operations with a focus on intelligence gathering through sophisticated techniques. These attacks have involved exploiting vulnerabilities in internet-facing devices to gain unauthorized access, subsequently deploying malware such as Cobalt Strike, Pantegana, and Spark RAT. The use of publicly available exploits has been a hallmark of their attack strategies, allowing them to infiltrate systems effectively.

Cybersecurity experts note that tracking Chinese cyber operations has become increasingly complex due to the evolving tactics employed by these threat actors. Over the past decade, numerous government indictments have highlighted the challenges in attributing cyber activities to specific groups, particularly as they adapt their methods in response to public scrutiny and law enforcement efforts.

 

Techniques and Tactics Employed

The operational tactics of Storm-2077 include sending phishing emails designed to harvest credentials from users of eDiscovery applications. This method enables attackers to exfiltrate sensitive emails that may contain critical information for advancing their operations. In some instances, the group has gained access to cloud environments by leveraging credentials obtained from compromised endpoints. Once they secure administrative access, they create applications with mail read rights, further enhancing their ability to monitor and extract information.

 

The GLASSBRIDGE Influence Operation

In conjunction with the activities of Storm-2077, Google's Threat Intelligence Group has unveiled another concerning operation named GLASSBRIDGE. This pro-China influence operation utilizes a network of fake news websites and newswire services to promote narratives that align with China's political agenda on a global scale. Since 2022, Google has blocked over a thousand websites associated with GLASSBRIDGE from appearing in its news products, highlighting the extensive reach of this disinformation campaign.

According to TAG researcher Vanessa Molter, these inauthentic news sites are often managed by a small number of digital PR firms masquerading as independent outlets. They republish content from Chinese state media and other materials likely commissioned by various PR agency clients. Notable entities involved include Shanghai Haixun Technology and Shenzhen Bowen Media, which have been implicated in distributing pro-Beijing content across legitimate news platforms.

 

Implications for Cybersecurity and Information Integrity

The emergence of Storm-2077 and GLASSBRIDGE underscores significant challenges for cybersecurity professionals and information integrity globally. The tactics employed by these groups illustrate a shift toward more sophisticated methods that extend beyond traditional social media manipulation into the realm of authentic-looking news dissemination. This evolution allows them to tailor content for specific regional audiences while presenting their narratives as credible information sources.

As cybersecurity threats continue to escalate, U.S. officials emphasize the need for robust defenses against such operations. The NSA and Cyber Command are increasingly focusing on AI-enabled cybersecurity measures to counteract the growing sophistication of these threats. They are also enhancing collaboration between government entities and private sector cybersecurity firms to share intelligence about vulnerabilities and attacks more effectively.

 

Conclusion

The activities of Storm-2077 and GLASSBRIDGE represent a dual threat: one targeting critical infrastructure through cyber attacks and another undermining public trust through disinformation campaigns. As these threats evolve, it is imperative for organizations across sectors to bolster their cybersecurity measures and remain vigilant against both direct attacks and manipulative information operations. The ongoing efforts by tech giants like Microsoft and Google highlight the importance of addressing these challenges collaboratively to safeguard national security and public discourse in an increasingly interconnected world.

Business News

Passing the Torch: Warren Buffett Bows Out, but Not Away

John Ridding Bids Farewell: The End of an Era at Financial Times

Cleveland-Cliffs CEO Declares War on Japan as He Eyes U.S. Steel Takeover

Harnessing AI: Transforming the Workplace for Enhanced Productivity

Navigating Economic Turbulence: The Inflation Conundrum

Featured Companies
logologologologologologologologologologologologologologologologologologologologo

Contact us for our upcoming Awards

why us ?

Elevate your understanding of the world of business with Best Business Magazine and news platform. The Executive Headlines genuinely support all top business leaders and the innovative technological ecosystem that surrounds and engages with them. The company ' logo encapsulates our entire idea; it comprises a magazine for influential business leaders and decision-makers. Offering up-to-the-minute, all-encompassing news coverage, market perspectives, and exclusive dialogues with corporate pioneers, we are your ultimate destination for remaining at the vanguard of the business sphere. Enroll with us today and position yourself at the forefront of business acumen with Best News Platform and Business Magazine