{"id":27512,"date":"2019-06-26T22:20:54","date_gmt":"2019-06-26T22:20:54","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/"},"modified":"2019-06-26T22:20:54","modified_gmt":"2019-06-26T22:20:54","slug":"hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/","title":{"rendered":"Hey China, while you&#8217;re in all our servers, can you fix these support tickets? IBM, HPE, Tata CS, Fujitsu, NTT and their customers pwned"},"content":{"rendered":"<p>Fresh details have emerged revealing just how deeply Chinese government hackers plundered HPE, IBM, DXC, Fujitsu, Tata, and others, stealing corporate secrets and rifling through their customers&#8217; networks.<\/p>\n<p>An <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.reuters.com\/investigates\/special-report\/china-cyber-cloudhopper\/\">explosive in-depth report<\/a> by Reuters today blows the lid off APT10, the infamous Beijing-backed hacking operation that was just <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/06\/25\/global_telcos_hacked\/\" rel=\"noopener noreferrer\">accused<\/a> of hacking mobile carriers around the world. APT10 was previously fingered for <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/04\/04\/chinese_hackers_target_msps\/\" rel=\"noopener noreferrer\">raiding corporations<\/a> and <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/12\/20\/two_alleged_chinese_hackers\" rel=\"noopener noreferrer\">organizations<\/a> globally, and siphoning off blueprints and databases for President Xi&#8217;s regime.<\/p>\n<p>This week&#8217;s bombshell builds on <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/12\/20\/two_alleged_chinese_hackers\/\" rel=\"noopener noreferrer\">last year&#8217;s revelations<\/a> that a multi-year operation known as Cloud Hopper had worked its way into the internal networks at HPE and IBM, stealing corporate data and trade secrets along the way, and then drilled into customer systems. The hackers compromised customer servers that were managed by the IT giants, or slipped in via network links between the tech providers and their big-name clients. Hence the name: Cloud Hopper.<\/p>\n<p>Now, word has dropped that another six companies fell victim to APT10 during that same campaign: Fujitsu, Tata Consultancy Services, Dimension Data, NTT, and Computer Sciences Corporation. It is believed most of the hacking took place between 2015 and 2017, though it&#8217;s said HP at least had been repeatedly pwned since 2010. (CSC is now known as DXC <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/04\/03\/hpe_csc_becomes_dxc\/\" rel=\"noopener noreferrer\">following its merger<\/a> with HPE&#8217;s spun-off Enterprise Services in 2017.)<\/p>\n<p>The revelations mean that the reach of the Cloud Hopper operation was far greater than first feared. In addition to the tech goliaths themselves, the hackers pushed their way into customer systems from the compromised providers, dramatically increasing the pool of valuable industrial and aerospace data stolen. Beijing&#8217;s miscreants had not just access to the internal files of HPE, IBM, Tata CS et al, but also their network-connected customers, putting designs, plans, personal information, and more, at their fingertips. Jackpot.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/12\/20\/wanted_zhu_zhang.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"FBI wanted poster of Zhu Hua and Zhang Shilong\"><\/p>\n<h2 title=\"Pair on cyber-espionage rap, HPE, IBM and their clients said to be among those hit\">Uncle Sam fingers two Chinese men for hacking tech, aerospace, defense biz on behalf of Beijing<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/12\/20\/two_alleged_chinese_hackers\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>We&#8217;re told that APT10 crew would typically find and exploit a vulnerability in an external-facing server to break in, or a spear-phish an employee to gain access to their intranet account.<\/p>\n<p>From there, they harvested additional account credentials from the compromised machine, and used those to access other boxes and services on the network, which were in turn ransacked for more login details, and used further move around the network until the attackers had near complete control over the entire infrastructure. From there, the intruders could siphon off information, and probe network-connected customers, particularly if they gained control of managed or cloud server administrator accounts.<\/p>\n<p>This mirrors the pattern found by researchers at Cybereason, who earlier this month <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.theregister.co.uk\/2019\/06\/25\/global_telcos_hacked\/\">detailed efforts<\/a> by APT10, or a gang operating just like the Chinese, to compromise ten or more cellular telcos around the world to spy on a few dozen VIPs \u2013 think politicians, foreign agents, etc.<\/p>\n<h3 class=\"crosshead\"><span>Taunts<\/span><\/h3>\n<p>Given the resources and time afforded to the operation, it comes as no surprise that APT10 was able to so thoroughly pwn their targets. By the end of the HPE operation, it is said that the hackers had such total control over the corporate network that they had begun leaving messages taunting system administrators.<\/p>\n<p>&#8220;One hacking tool contained the message &#8216;FUCK ANY AV&#8217; \u2013 referencing their victims\u2019 reliance on antivirus software,&#8221; the Reuters team noted. &#8220;The name of a malicious domain used in the wider campaign appeared to mock US intelligence: nsa.mefound.com.&#8221;<\/p>\n<p>In a statement to <em>The Register<\/em>, a DXC spokesperson claimed: \u201cDXC has robust security measures in place to actively detect, prevent and alert attacks by actors such as APT10 We also have implemented tools that allow detailed reconstruction of any intrusions attempts, should they happen.<\/p>\n<p>&#8220;Since the inception of DXC Technology [in 2017], neither the company nor any DXC customer whose environment is under our control have experienced a material impact caused by APT10 or any other threat actor.&#8221;<\/p>\n<p>A spokesperson for HPE told <em>The Register<\/em> with a straight face: &#8220;The security of HPE customer data is always our top priority. As is the case in any breach, the company worked diligently for our customers to mitigate this attack and protect their information. And, we remain vigilant in our efforts to protect against the evolving threats of cyber-crimes committed by state actors.&#8221;<\/p>\n<p>The rest \u2013 IBM, Fujitsu, Tata CS, Dimension Data, and NTT \u2013 are keeping schtum. Big Blue previously claimed it found no evidence that hackers had accessed its sensitive corporate data. \u00ae<\/p>\n<h3 class=\"crosshead\"><span>Bootnote<\/span><\/h3>\n<p>Props to China for its deadpan comedy bit in response to today&#8217;s revelations: &#8220;The Chinese government has never in any form participated in or supported any person to carry out the theft of commercial secrets.&#8221;<\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/06\/26\/china_apt10_hpe_ibm_dxc_hacked\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Oh no Xi didn&#8217;t! Fresh details emerge on mega-hack Fresh details have emerged revealing just how deeply Chinese government hackers plundered HPE, IBM, DXC, Fujitsu, Tata, and others, stealing corporate secrets and rifling through their customers&#8217; networks.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27513,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-27512","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hey China, while you&#039;re in all our servers, can you fix these support tickets? IBM, HPE, Tata CS, Fujitsu, NTT and their customers pwned 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hey China, while you&#039;re in all our servers, can you fix these support tickets? IBM, HPE, Tata CS, Fujitsu, NTT and their customers pwned 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-26T22:20:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hey China, while you&#8217;re in all our servers, can you fix these support tickets? IBM, HPE, Tata CS, Fujitsu, NTT and their customers pwned\",\"datePublished\":\"2019-06-26T22:20:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\\\/\"},\"wordCount\":800,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\\\/\",\"name\":\"Hey China, while you're in all our servers, can you fix these support tickets? IBM, HPE, Tata CS, Fujitsu, NTT and their customers pwned 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned.jpg\",\"datePublished\":\"2019-06-26T22:20:54+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hey China, while you&#8217;re in all our servers, can you fix these support tickets? IBM, HPE, Tata CS, Fujitsu, NTT and their customers pwned\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hey China, while you're in all our servers, can you fix these support tickets? IBM, HPE, Tata CS, Fujitsu, NTT and their customers pwned 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/","og_locale":"en_US","og_type":"article","og_title":"Hey China, while you're in all our servers, can you fix these support tickets? IBM, HPE, Tata CS, Fujitsu, NTT and their customers pwned 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-06-26T22:20:54+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hey China, while you&#8217;re in all our servers, can you fix these support tickets? IBM, HPE, Tata CS, Fujitsu, NTT and their customers pwned","datePublished":"2019-06-26T22:20:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/"},"wordCount":800,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/","url":"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/","name":"Hey China, while you're in all our servers, can you fix these support tickets? IBM, HPE, Tata CS, Fujitsu, NTT and their customers pwned 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned.jpg","datePublished":"2019-06-26T22:20:54+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hey-china-while-youre-in-all-our-servers-can-you-fix-these-support-tickets-ibm-hpe-tata-cs-fujitsu-ntt-and-their-customers-pwned\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Hey China, while you&#8217;re in all our servers, can you fix these support tickets? IBM, HPE, Tata CS, Fujitsu, NTT and their customers pwned"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27512"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27512\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27513"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}