EU Sanctions Chinese, Iranian Hacking Groups for Device Breaches and Olympic Cyberattacks
好,我现在需要帮用户总结这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”这样的开头。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是欧盟对来自中国和伊朗的三个实体和个人实施新的制裁。制裁的原因包括网络间谍活动、关键基础设施攻击以及在2024年巴黎奥运会期间的数字劫持。被制裁的公司包括Integrity Technology Group和Anxun Information Technology,它们涉及大规模设备入侵和针对欧盟成员国的关键基础设施的黑客服务。此外,伊朗的Emennet Pasargad被指控进行数据泄露、暗网销售以及奥运会期间的虚假信息传播。 制裁措施包括资产冻结、禁止资金往来和旅行禁令。欧盟通过这些措施打击网络战背后的商业实体,显示出他们对维护网络安全的决心。 接下来,我需要将这些要点浓缩到100字以内。要确保涵盖被制裁的国家、公司、具体行为以及制裁措施。同时保持语言简洁明了。 最后,检查一下是否符合用户的要求:中文总结,不使用特定开头,控制在100字以内。 </think> 欧盟宣布对来自中国和伊朗的三家公司及两人实施制裁,指控其参与网络间谍、关键基础设施攻击及2024年巴黎奥运会期间的数字劫持等行为。受制裁公司包括为中国提供网络攻击工具的企业及伊朗相关团体。制裁措施包括资产冻结、资金禁运及旅行限制。 2026-3-17 10:19:13 Author: thecyberexpress.com(查看原文) 阅读量:4 收藏

EU Sanctions, Iran, Chinese Hacking,

The European Union has officially had enough of state-adjacent hackers treating its member states like a digital playground.

On Monday, the EU Council announced a fresh wave of severe sanctions targeting three entities and two individuals from China and Iran. The charges include cyber espionage, critical infrastructure hacking, and a rather brazen digital hijacking during the 2024 Paris Olympics.

The restrictive measures, implemented under the EU’s horizontal cyber sanctions regime, represent a growing willingness in Brussels to name, shame, and financially choke the corporate entities that operate in the gray zone of state-sponsored cyber warfare.

The Chinese Connection for EU Sanctions

Two of the newly sanctioned entities are based in China, which is popularly known to harness the “hack-for-hire” ecosystems and the commercialization of offensive cyber tools.

First on the chopping block is Integrity Technology Group. According to the EU, this firm has not just been dabbling in low-level espionage but it provided the specific tooling used to compromise more than 65,000 devices across six different EU member states between 2022 and 2023. Supplying the digital lockpicks for mass device exploitation has earned the company a total freeze on any European assets.

Joining them on the blacklist is Anxun Information Technology, alongside two of its Chinese co-founders. The Council explicitly called out Anxun for providing targeted hacking services aimed directly at the critical infrastructure and core government functions of EU member states. This shows that the market for offensive cyber capabilities remains booming, and the EU is now willing to target the executive leadership behind these mercenary outfits, not just the technical operators.

report-ad-banner

Dark Web Sales and Olympic Trolling

The third sanctioned entity, Iran-based Emennet Pasargad, boasts a track record of chaotic, highly visible disruptions.

The EU attributes a laundry list of disruptive attacks to the group. Emennet Pasargad allegedly breached a French subscriber database, siphoning off private data and subsequently fencing the stolen content on the dark web.

But their most public stunt occurred during the 2024 Paris Olympics. The group managed to hack into digital billboards in the French capital, leveraging the highly visible displays to broadcast disinformation during one of the most televised events on the planet. As if that was not enough, the group is also accused of compromising a Swedish SMS service, blasting disruptive messages to a massive swath of EU citizens.

The Fallout

With Monday’s additions, the EU’s cyber sanctions list now covers a total of 19 individuals and seven corporate entities.

The penalties are not just strongly worded diplomatic letters but carry real financial weight. The listed entities and individuals are subject to strict asset freezes within the EU. Furthermore, European citizens and tech businesses are legally barred from providing any funds, financial assets, or economic resources to them. For the two Anxun co-founders, the sanctions also include a strict travel ban, locking them out of entering or even transiting through EU territory.

While sanctions alone rarely stop dedicated state-backed actors, the Council’s latest move showcases how EU is actively mapping the corporate supply chains of cyber warfare, and that they are coming after the wallets of the companies enabling it.

Also read: Cyber Resilience Act: EU Adopts New Law to Strengthen Digital Product Security

文章来源: https://thecyberexpress.com/eu-sanctions-chinese-iranian-hacking-groups/
如有侵权请联系:admin#unsafe.sh