Category Archives: China Hack

China’s Hacking Of U.S. Remains A Top Concern : NPR

U.S officials have long complained about countries that systematically hack into U.S. computer networks to steal valuable data, but until recently they did not name names.

In the last few months, that has changed. China is now officially one of the cyber bad guys and probably the worst.

“We know and there’s good evidence … of very deliberate, focused cyber espionage to capture very valuable research and development information, or innovative ideas, or source code or business plans for their own advantage,” says Mike McConnell, a former director of national intelligence and before that the director of the National Security Agency.

It’s the Chinese he’s talking about, though other countries also engage in cyber espionage to gain a competitive edge. Russia, for example, but China stands out as especially aggressive.

“China does not care what other people think,” says Richard Bejtlich, the chief security officer at MANDIANT, a company that helps firms deal with cyber intrusions. “Culturally they are very interested in being seen as responsible, but when it comes to their actual work on the ground; if you try kicking them out of your network on a Friday, they’re back on a Monday.”

The increased willingness of the U.S. government to point a finger at the Chinese dates from an official report released last October that identified them “as the world’s most active and persistent perpetrators of economic espionage.”

via China’s Hacking Of U.S. Remains A Top Concern : NPR.

Advertisements

China Cyber Attack Threat

It is clear that cyber warfare will be part of any future conflict and we must become prepared for that type of combat here on the homeland front.

Two recent NPR stories highlighted the continuing potential for cyber attacks.  One focused on the threat that China poses and the other story on what we should be doing in general to legislate cyber defenses for the private sector and our critical infrastructure–the vast majority of which is owned and operated by private business.

It is clear to me that China is actively working to determine the how best to attack our military and industrial complexes.  The cyber war of the future has already begun.  Going back to my military training let’s consider what it is that they are doing.

via China Cyber Attack Threat.


Hacked: How China is stealing Americas business secrets

Sen. John Kerry is fed up with Chinas penchant for looting technology from U.S. businesses — up to $400 billion worth of data each year. When will it stop?POSTED ON FEBRUARY 16, 2012, AT 3:52 PMChinese gamers at an internet cafe: Sen. John Kerry D-Mass. says Chinese hackers are illegally stealing business secrets from American firms. Photo: Imaginechina/Corbis SEE ALL 54 PHOTOSChinese Vice President Xi Jinping, slated to be the next leader of the worlds most populous nation, is getting an earful from U.S. officials over Chinas shady business practices. During Xis first official tour of the U.S. this week, Sen. John Kerry D-Mass. accused a Chinese company of bankrupting a U.S. competitor by ransacking its software. And thats just the tip of the iceberg, alleges Kerry, implicating China in “cyber-attacks, access-to-market issues, espionage [and] theft.” And, indeed, a flurry of recent reports indicate that Chinese hackers, backed by the government, are stealing business secrets from the U.S. Here, a guide:

via Hacked: How China is stealing Americas business secrets – The Week.


China vows to speed up convergence of TV, Internet, phone in 2012 – Xinhua | English.news.cn

BEIJING, Dec. 26 (Xinhua) — China will push ahead the convergence of television, Internet and telecom services in 2012, said Miao Wei, minister of Industry and Information Technology, Monday.

The government will expand pilot projects to all the municipalities, provincial capitals and other eligible cities next year, Miao said.

Last year, only 12 cities were chosen for the trial, including two municipalities, Beijing and Shanghai, and four provincial capitals, Harbin, Nanjing, Hangzhou and Wuhan.

The tri-network integration, which allows users to access television, Internet and mobile phone services through a single device, was listed in the government work report last year as one of the emerging strategic industries for priority development and slated for completion by 2015.

China achieved some progress in facilitating connections of broadcast and telecommunications networks in 2011 and was able to provide consumers with products and services, Miao said.

By the end of November, China’s Internet protocol television (IPTV) users have exceeded 11 million, while mobile video subscribers have surpassed 40 million.

via China vows to speed up convergence of TV, Internet, phone in 2012 – Xinhua | English.news.cn.


China’s Cyber Militia

There’s been an interesting new development in China’s use of cyber space as an element in its intelligence and security operations. The People’s Liberation Army (PLA) is reportedly funding a vast complex of part-time cyber-devotees to supplement and compliment the official structure of cyber interception and invasion.

Equally as interesting is the willingness of the Chinese authorities to allow the publication of this fact. The first official recognition of this program occurred in one chosen hi-tech factory in 2002. According to an official PLA publication, there are now thousands of such units around the country. Obviously the proliferation was considered too great to hide.

via The American Spectator : China’s Cyber Militia.


Mitsubishi Heavy Industries Hacked: Japan Defense Industry’s First Cyberattack

TOKYO (Reuters) – Japan’s biggest defense contractor, Mitsubishi Heavy Industries Ltd, said on Monday hackers had gained access to its computers, with one newspaper saying its submarine, missile and nuclear power plant component factories had been the target.

The company said in a statement that some information could have been stolen in the first known cyber attack on Japan’s defense industry.

“We’ve found out that some system information such as IP addresses have been leaked and that’s creepy enough,” said a Mitsubishi Heavy spokesman.

via Mitsubishi Heavy Industries Hacked: Japan Defense Industry’s First Cyberattack.


Chinese nationals convicted of illegally exporting military technology to China | Homeland Security News Wire

The Chinese broad campaign of stealing U.S. military and commercial technology intensifies, but so does the rate of conviction of Chinese and American nationals who are the foot soldiers in this campaign; two Chinese nationals are convicted in Massachusetts for illegally delivering to China electronics components used in military radar and electronic warfare

Following a five-week trial, a federal jury in Massachusetts found two Chinese nationals, one of whom resided in the United States, guilty of illegally conspiring to violate U.S. export laws and illegally exporting electronic equipment from the United States to China, the Justice Department announced. Several Chinese military entities were among those receiving the exported equipment. The jury also convicted a Waltham, Massachusetts, corporation, owned by one of the defendants, which procured the equipment from U.S. suppliers and then exported the goods to China through Hong Kong. The exported equipment is used in electronic warfare, military radar, fire control, military guidance and control equipment and satellite communications, including global positioning systems.

via Chinese nationals convicted of illegally exporting military technology to China | Homeland Security News Wire.


Cyber attacks again | Korea Herald

Korean businesses, financial institutions and government agencies have been frequently targets of hacking in the past. It is like an epidemic. The latest case involves SK Communications, which runs the Cyworld social networking website and the Nate online portal.

The hackers, whose attacks reportedly originated in China, stole personal information of 35 million clients of Cyworld and Nate last week. The victims are now exposed to the risk of online scams and voice phishing.

SK Communications claims the hackers cannot easily use much of the personal information they have obtained because the passwords and resident registration numbers of the clients encrypted. But if the culprits are capable of hacking such a security-minded Internet portal as Nate, they may easily decode the encrypted information.

Moreover, it is commonly accepted that there is no foolproof method to permanently deny a determined, competent hacker access to computer networks. He will eventually find a way to crack the software defense to get access to the targeted information no matter how technologically sophisticated it may be.

Of course, this is not to say that nothing can be done as a precaution against hacking. Damage can be controlled though it may not be prevented, as evidenced by what SK Communications is planning to do as a remedial measure.

Read More > http://www.koreaherald.com/opinion/Detail.jsp?newsMLId=20110731000182


China’s cyber abilities worry U.S.: spy chief facing a cyber threat

China’s growing capabilities in cyber-warfare and intelligence gathering.

http://www.reuters.com/resources_v2/flash/video_embed.swf?videoId=211488490


Foreign spies stole weapons data from U.S. contractor – Washington Times

Defense contractor Lockheed Martin was hacked by suspected Chinese intruders several weeks ago, and Google and several other U.S. corporations have been victims of cyber-attacks. Computer security specialists say China and Russia have sophisticated computer warfare capabilities.

Foreign spies broke into a U.S. defense contractor’s computer network and stole valuable weapons data, Pentagon officials disclosed for the first time on Thursday in releasing a cybersecurity strategy aimed at bolstering Internet defenses.

Deputy Defense Secretary William J. Lynn III declined to name the contractor or to provide further details of the intrusion in March, except to say that 24,000 files “related to [weapons] systems being developed for the Department of Defense” had been stolen.

“We think it was a foreign intelligence service,” he said, adding that such thefts were the most common forms of cyber-attack directed at the United States.

“The most prevalent cyberthreat to date has been exploitation — the theft of information and intellectual property from government and commercial networks,” he said in a speech at the National Defense University, calling such attacks “deeply corrosive in the long term.”

Thefts like those in March have bedeviled the defense industry for more than five years, said Mr. Lynn, adding that the information stolen in such computer break-ins related to “a wide swath of crucial military hardware, extending from missile tracking systems and satellite navigation devices to [unmanned aerial vehicles] and the Joint Strike Fighter.”

via Foreign spies stole weapons data from U.S. contractor – Washington Times.