Chinese government believed to behind PLA hackers for strategic military information. |
The most troubling aspect of the Chinese cyberattacks is that this appears not to be a rogue PLA operation. The PLA is the consolidated military organization for China’s land, sea, strategic missile and air force, and one of the main tactics in its portfolio is cyberwarfare. Moreover, China's Central Military Commission, which tightly controls and oversees everything the PLA does, is chaired by the country’s incoming president, Xi Jinping, who also serves in China’s most important post, Communist Party General Secretary.
China’s top targets are aerospace, energy, information technology, satellites and telecommunications, public administration and research and consulting information. The stolen information could be used to wage economic, military and political sabotage and warfare against the United States.
A Virginia-based cybersecurity firm, Mandiant, made its latest revelation in a report Tuesday titled, “Exposing One of China’s Cyber Espionage Units.” It reportedly traced 141 major hacking attempts to the People’s Liberation Army spanning 20 major industries since 2006 — 115 of them against U.S. targets.
This is not the first time China operatives have been caught doing this. In the early 2000s, the U.S. “Titan Rain” investigation revealed that Chinese cyberspies penetrated secure U.S. computer networks serving the country’s most sensitive military bases, defense contractors and aerospace companies, including New Mexico's Sandia National Laboratory where much of the U.S. nuclear arsenal is designed, and National Air and Space Administration where space exploration, scientific discovery and aeronautics research are pioneered.
According to Mandiant, Chinese hackers typically gain entry to targeted computer networks through “spearfishing” attacks, where someone in an organization receives a creatively disguised email and is tricked into clicking on a link or attachment that then opens a secret door for the hackers. Once in the system, as described by Time magazine in its “Titan Rain” report, hackers commandeer a hidden section of a computer hard drive, zip up as many files as possible and immediately transmit the data to overseas way stations before sending them to mainland China. They always make a silent escape, wiping their electronic fingerprints clean and leaving behind an almost undetectable beacon allowing them to re-enter the machine at will.
It doesn’t appear the Chinese cyberattacks are going to end any time soon. According to news reports, Chinese computer hackers attacked the Department of Energy’s computer networks in late January 2013, penetrating 14 servers and 20 workstations. In addition, hackers routinely use malware via the Internet and from computers traceable to China to target American businesses, government agencies, news organizations and any other sources of intellectual property.
No comments:
Post a Comment