PDA

View Full Version : Chinese government believed to be behind industry hacking in Canada, Britain, US



Ian
02-20-2013, 01:56 AM
This was an interesting read, thought maybe someone here would find it interesting too.

http://www.montrealgazette.com/news/national/Canada+hackers+believed+backed+secretive+Chinese/7986901/story.html


Canada is among the countries that has been targeted by a sophisticated hacking group believed to be backed by a secretive unit of the Chinese government, according to a report released Tuesday by an American computer security firm.

The report by Mandiant identified the hackers, known collectively as APT1, as “one of the most prolific cyber-espionage groups” and suggested they were supported by Shanghai-based Unit 61398 of the People’s Liberation Army.

The hackers have waged attacks on an array of industries, mostly in the United States, but also in Britain and Canada, including an attack last September on Calgary-based Telvent Canada, which provides IT systems for critical infrastructure, the report said.

China’s Foreign Ministry dismissed the report Tuesday as “groundless,” and the Defence Ministry denied any involvement in hacking attacks.

But David Skillicorn, a computing professor and cyber-hacking expert at Queen’s University, said the evidence contained in the report was “damning.”

“It can’t be anything but Chinese government-sponsored,” he said. “This is a huge pile of evidence.”

Particularly worrisome, Skillicorn said, is that the Chinese hackers may not just be setting their sights on stealing companies’ secrets but could be looking to target critical infrastructure as well, which could have “disastrous” consequences.

Last September, Telvent Canada, which creates software to help monitor energy-related infrastructure, including power grids and oil and gas pipelines, notified its customers about a security breach.

The computer security blog KrebsOnSecurity.com reported at the time that the breach spanned operations in the U.S., Canada and Spain, and that a Chinese hacking group was likely to blame.

The Mandiant report said Tuesday that its analysts linked the attack to APT1 “based on the tools and infrastructure that the hackers used to exploit and gain access to the system.”

Martin Hanna, a spokesman for Schneider Electric, which owns Telvent, said in an email that the company has been working with its customers and is also actively working with law enforcement and security specialists.

APT1, which is also known in the security community as “Comment Crew,” has been responsible for stealing hundreds of terabytes of data since 2006 from at least 141 organizations spanning 20 industries — including information technology, aerospace, public administration, satellite and telecommunications, scientific research and energy, the Mandiant report said.

Targeting mostly English-speaking countries, this group of hackers has been able to access organizations’ technology blueprints, proprietary manufacturing processes, test results, business plans, pricing documents, partnership agreements, and emails and contact lists, the report said.

Mandiant said it traced APT1’s activities to four networks in Shanghai, two of which serve the Pudong New Area, which is also where the Chinese army’s Unit 61398 is located.

Unit 61398 is staffed by hundreds, perhaps thousands of people Its personnel are trained in computer security and computer network operations and are required to be proficient in English, Mandiant said.

“The nature of APT1’s targeted victims and the group’s infrastructure and tactics align with the mission and infrastructure of PLA Unit 61398,” the report concluded.

Joe Stewart, director of malware research for Dell SecureWorks, said in an interview Tuesday that though he was hesitant to draw a direct link between APT1 and the Chinese government, the proof offered by Mandiant was pretty convincing.

The security community has been discussing a “Shanghai nexus” for Chinese-based attacks as far back as 2011, he said.

Stewart said though the Chinese hackers have launched attacks on energy infrastructure companies, it remains unclear whether they intend to do any harm to physical infrastructure.

Still, the ongoing attacks should serve as a wake-up call to organizations to protect themselves. While some companies have heeded the warnings, others don’t seem to want to admit their vulnerabilities and are “just burying it internally,” he said.

U.S. President Barack Obama addressed cyber-security during his state of the union address last week.

“We know foreign countries and companies swipe our corporate secrets,” Obama said. “Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems. We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy.”

Skillicorn, the Queen’s professor, said he doesn’t think the Canadian government has addressed the cyber-security problem sufficiently and currently lacks a clear lead agency on the matter. He suggested that Communications Security Establishment Canada could fulfil that role.

Julie Carmichael, a spokeswoman for Public Safety Minister Vic Toews, said Public Safety Canada is the lead on cyber security.

“Our government takes cyber security seriously and operates on the advice of security experts,” she said in an email. “Our government recently made significant investments ($245 million) in a Cyber Security Strategy designed to defend against electronic threats, hacking and cyber espionage,” Carmichael said.



Read more: http://www.canada.com/Canada+hackers+believed+backed+secretive+Chinese+g overnment+unit/7986901/story.html#ixzz2LOrMjeTi

Sawyer
02-20-2013, 03:28 AM
They not only will work for barely any money and encouraged jobs to be shipped there, but they also hack other industries' secrets? Somebody needs to do something... Of course this could be false information. Ya' never know.

Rincewind
02-20-2013, 03:41 AM
Its far beyond time we get tough on China. They aren't exempt from the rules.

Wardancer
02-20-2013, 06:44 AM
Just as an example of how hacking can turn into "physical" consequences too on critical infrastructure:

http://en.wikipedia.org/wiki/Stuxnet

China isn't the only government using hacking. It doesn't make it any more acceptable, but I think it's interesting to have a general view of the picture. That being said, the particularity of China might be that its the only country doing it for economic purposes though (as far as I know). I'm not sure if that makes it more moral or less...it's up to discussion.

Over the years, I got to read a few books regarding biological weapons created by the USA and USSR (the soviets going much farther and keeping at it for much longer). Even if both countries feigned indignance when accused of developing such weapons, what came up of it, even if it was deemed as immoral and unethical to use (from the US), was a complete understanding of the offensive capabilities and a very precise knowledge of how to produce and use these kind of weapons. What I'm getting to is that we can be sure that western countries certainly also do have the capabilities to strike on the web. The process of developing defences to these attacks require an understanding of the attacks. All I can say is that there must be so much that we are unaware of. Our countries might be a lot more active than what we imagine.

I'm personally afraid of an internet war which could cause critical damage to public infrastructures and that, even for countries my country would be at war at. You don't strike a hospital or a (nuclear) power plant...even if you're at war.

Neznam
02-20-2013, 08:09 AM
As if the USA or Russia don't do this to china. It just doesn't get reported. Not to mention the other countries.

Much safer hacking info than sending a spy in to get killed for info.