Suck-O Time

Who's online


Now online:
  • 117 guests

Latest members:
  • oacshaunte0807090356
  • davismowery5659
  • doriellanos7548495
  • xavierhummel395405
  • rosellamaldonado6

Total members: 41988

Resources

 


China Accused of Cyber Espionage PDF Print E-mail
Written by computathug   
Thursday, 03 November 2011 01:29
Cyber attacks traced to China targeted at least 48 chemical and military-related companies in an effort to steal technical secrets, a US computer security company said yesterday.
The targets included 29 chemical companies and 19 others that make advanced materials used by the military, California-based Symantec said in a report.
It said the group included multiple Fortune 100 companies but did not identify them or say where they were located.
"The purpose of the attacks appears to be industrial espionage, collecting intellectual property for competitive advantage," said the report.
Security experts said China was a centre for internet crime. Attacks against governments, companies and human rights groups had been traced to this country, though finding the precise source was nearly impossible.
China's military is a leader in cyberwarfare research but the government has rejected allegations of cyberspying and says it also is a target.
The latest attacks occurred between late July and September and used e-mails sent to companies to plant software dubbed "PoisonIvy" in their computers, Symantec said.
It said the same hackers also were involved in attacks earlier this year on human rights groups and auto companies.
Symantec said it traced the attacks to a computer system owned by a Chinese man in his 20s in the central province of Hebei. It said that when contacted, the man provided a contact who would perform "hacking for hire".
Symantec said it could not determine whether the Chinese man was a lone attacker, whether he had a direct or indirect role or whether he hacked the targets for someone else. It called him "Covert Grove" based on a translation of his Chinese name.
The US and Chinese governments have accused each other of being involved in industrial espionage.
Security consultants say the high skill level of earlier attacks traced to China suggests its military or other government agencies might be stealing technology and trade secrets to help state companies.
The chairman of the US House of Representatives Intelligence Committee, Republican Mike Rogers, said last month that Chinese efforts to steal US technology over the internet had reached an "intolerable level." He called on the US and other governments to pressure Beijing to stop.
Another security firm, McAfee said in August it had found a five-year-long hacking campaign that it called Operation Shady Rat against more than 70 governments, international institutions, corporations and think tanks.
In February, McAfee said hackers operating from China stole information from oil companies in the United States, Taiwan, Greece and Kazakhstan about operations, financing and bidding for oil fields.
Thousands of Chinese computer enthusiasts belong to hacker clubs and experts say some are supported by the military to develop a pool of possible recruits. Experts say military-trained civilians also might work as contractors for companies that want to steal technology or business secrets from rivals.
China has the world's biggest population of internet users, with more than 450 million people online, and the government promotes Web use for business and education. But experts say security for many computers in China is so poor that they are vulnerable to being taken over and used to hide the source of attacks from elsewhere.
Last year, Google closed its China-based search engine after complaining of cyber attacks from China against its e-mail service.
That case highlighted the difficulty of tracking hackers. Experts said that even if the Google attacks were traced to a computer in China, it would have to be examined in person to be sure it wasn't hijacked by an attacker abroad.
Last Updated on Thursday, 03 November 2011 00:43
 

Sorry, but you have to be registered and logged in to post comments.