Researchers say the state-sponsored espionage operation may also lay the groundwork for disruptive cyberattacks. Share this post Share on FacebookShare on Facebook TweetShare on Twitter Pin itShare on Pinterest Share on LinkedInShare on LinkedIn Share on WhatsAppShare on WhatsApp Author: Andy Greenberg, Lily Hay Newman https://www.wired.com/latest Post navigationPreviousPrevious post:Sam Altman’s World Tour Hopes to Reassure AI DoomersNextNext post:Ron DeSantis Pushed Elon Musk’s Twitter to Its Breaking PointRelated PostsBcrypt, a Popular Password Hashing Algorithm, Starts Its Long GoodbyeMay 25, 2023The Security Hole at the Heart of ChatGPT and BingMay 25, 2023Leaked EU Document Shows Spain Wants to Ban End-to-End EncryptionMay 22, 2023The Real Risks in Google’s New .Zip and .Mov DomainsMay 21, 2023A TikTok ‘Car Theft’ Challenge Is Costing Hyundai $200 MillionMay 20, 2023How You, or Anyone, Can Dodge Montana’s TikTok BanMay 19, 2023