RegulationHIGH

EU Sanctions - Chinese and Iranian Companies for Cyberattacks

🎯

Basically, the EU is punishing companies from China and Iran for hacking important systems.

Quick Summary

The EU has taken decisive action by sanctioning Chinese and Iranian companies involved in cyberattacks. This includes asset freezes and travel bans for individuals. The move is crucial for protecting critical infrastructure and deterring future cyber threats.

What Happened

On March 18, 2026, the Council of the European Union imposed sanctions on two Chinese companies and one Iranian entity due to their involvement in cyberattacks. These attacks targeted critical infrastructure across multiple EU member states, compromising over 65,000 devices. The sanctioned entities include Integrity Technology Group and Anxun Information Technology from China, and Emennet Pasargad from Iran.

Integrity Technology Group was linked by the FBI to the Raptor Train botnet, which infected 260,000 devices. Anxun Information Technology, also known as i-Soon, faced charges from the U.S. Justice Department for offering hacking services. The Iranian company, Emennet Pasargad, was involved in misinformation campaigns, notably hijacking advertising billboards during the Paris Olympics.

Who's Affected

The sanctions affect the sanctioned companies and their co-founders, who are now subject to asset freezes and travel bans. This action is part of a broader strategy by the EU to combat cyber threats from state-sponsored actors. Currently, there are 19 individuals and seven entities under EU cyber sanctions, reflecting the growing concern over international cyber threats.

These measures aim to deter further cyberattacks and hold companies accountable for their actions. The implications extend beyond the sanctioned entities, as they signal to other potential aggressors that cyber misconduct will not be tolerated.

What Data Was Exposed

The cyberattacks orchestrated by these companies have raised significant concerns about the security of critical infrastructure. The compromised devices could include anything from industrial control systems to personal devices used by citizens.

The Raptor Train botnet is particularly alarming, as it demonstrates the potential for widespread disruption. The attacks not only threaten individual privacy but also pose risks to national security and public safety. The EU's response underscores the importance of protecting sensitive data and infrastructure from malicious actors.

What You Should Do

For individuals and organizations, it is essential to remain vigilant against potential cyber threats. Here are some steps to take:

  • Update security protocols: Ensure that all systems are up to date with the latest security patches.
  • Monitor for unusual activity: Keep an eye on network traffic for any signs of unauthorized access.
  • Educate staff: Provide training on recognizing phishing attempts and other common cyber threats.

By taking proactive measures, organizations can help mitigate the risks posed by such cyberattacks and enhance their overall security posture.

🔒 Pro insight: These sanctions reflect a growing trend in international cybersecurity policy, aiming to hold state-sponsored actors accountable for their actions.

Original article from

SC Media

Read Full Article

Related Pings

HIGHRegulation

DHS Surveillance Spending - Oversight Concerns Rise

The DHS is set to spend hundreds of millions on surveillance tech, raising privacy concerns. Advocacy groups warn of potential abuses and lack of oversight. Lawmakers demand transparency in these decisions.

SC Media·
MEDIUMRegulation

White House Cyber Strategy - 6 Ways to Implement Effectively

The White House has launched a new cyber strategy with six key priorities. Industries must adapt to these changes to enhance security and compliance. Collaboration between public and private sectors is essential for effective implementation.

SC Media·
MEDIUMRegulation

Audit Readiness - 5 Steps to Modernize Compliance Checks

Organizations struggle with audit readiness, often reverting to manual processes. Discover five actionable steps to modernize compliance checks and improve outcomes effectively.

Qualys Blog·
MEDIUMRegulation

Audit Readiness - 5 Steps to Modernize Compliance Checks

Organizations often find audit readiness to be a reactive process. This article shares five steps to enhance compliance outcomes through strategic automation and prioritization. By modernizing their approach, teams can improve efficiency and effectiveness in audits.

Qualys Blog·
HIGHRegulation

Japan - New Proactive Cyber-Defense Operations Approved

Japan is set to launch proactive cyber-defense operations on October 1st. This move allows the Self-Defense Forces to conduct offensive cyber actions, enhancing national security. Citizens and businesses should prepare for increased cybersecurity measures and potential impacts on data privacy.

The Register Security·
HIGHRegulation

Cybersecurity Regulation - Rising Legal Risks for 2026

As cybersecurity threats rise, so do legal risks for organizations. New regulations are changing the landscape, making compliance critical. Companies must adapt to avoid legal pitfalls and protect sensitive data.

CSO Online·