[LINK] D'oh!
stephen at melbpc.org.au
stephen at melbpc.org.au
Tue Feb 26 16:08:48 AEDT 2013
Hahaha ..
"The Rand Corporations Libicki said that .. most activity between malware
embedded in a compromised system and the malwares controllers takes place
during Beijing time zone's business hours. (Also,) Internet security firm
Mandiant noticed patterns while monitoring attacks on the New York Times
last year .. hacker activity began at around 8:00 a.m. Beijing time and
usually lasted a standard workday (and then) hackers take the weekend off."
That sounds like a paid job to me ..
"Chinese hackers seen as increasingly professional"
By AP News Feb 25, 2013 <http://asiancorrespondent.com/99395/chinese-
hackers-seen-as-increasingly-professional/>
BEIJING (AP) Beijing hotly denies accusations of official involvement in
massive cyberattacks against foreign targets, insinuating such activity is
the work of rogues. But at least one element cited by Internet experts
points to professional cyberspies: Chinas hackers take the weekend off.
Accusations of state-sanctioned hacking took center stage this past week
following a detailed report by a U.S.-based Internet security firm
Mandiant. It added to growing suspicions that the Chinese military is not
only stealing national defense secrets and harassing dissidents but also
pilfering information from foreign companies that could be worth millions
or even billions of dollars.
Experts say Chinese hacking attacks are characterized not only by their
brazenness, but by their persistence.
China conducts at least an order of magnitude more than the next country,
said Martin Libicki, a specialist on cyber warfare at the Rand Corporation,
based in Santa Monica, California. The fact that hackers take weekends off
suggests they are paid, and that would belie the notion that the hackers
are private, he said.
Libicki and other cyber warfare experts have long noted a Monday-through-
Friday pattern in the intensity of attacks believed to come from Chinese
sources, though there has been little evidence released publicly directly
linking the Chinese military to the attacks.
Mandiant went a step further in its report Tuesday saying that it had
traced hacking activities against 141 foreign entities in the U.S. Canada,
Britain and elsewhere to a group of operators known as the Comment Crew
or APT1, for Advanced Persistent Threat 1, which it traced back to the
Peoples Liberation Army Unit 61398. The unit is headquartered in a
nondescript 12-story building inside a military compound in a crowded
suburb of Chinas financial hub of Shanghai.
Attackers stole information about pricing, contract negotiations,
manufacturing, product testing and corporate acquisitions, the company
said.
Hacker teams regularly began work, for the most part, at 8 a.m. Beijing
time. Usually they continued for a standard work day, but sometimes the
hacking persisted until midnight. Occasionally, the attacks stopped for
two-week periods, Mandiant said, though the reason was not clear.
China denies any official involvement, calling such accusations
groundless and insisting that Beijing is itself a major victim of hacking
attacks, the largest number of which originate in the U.S. While not
denying hacking attacks originated in China, Foreign Ministry spokesman
Hong Lei said Thursday that it was flat out wrong to accuse the Chinese
government or military of being behind them.
Mandiant and other experts believe Unit 61398 to be a branch of the PLA
General Staffs Third Department responsible for collection and analysis of
electronic signals such as e-mails and phone calls. It and the Fourth
Department, responsible for electronic warfare, are believed to be the PLA
units mainly responsible for infiltrating and manipulating computer
networks.
China acknowledges pursuing these strategies as a key to delivering an
initial blow to an opponents communications and other infrastructure
during wartime but the techniques are often the same as those used to
steal information for commercial use.
China has consistently denied state-sponsored hacking, but experts say the
office hours that the cyberspies keep point to a professional army rather
than mere hobbyists or so-called hacktivists inspired by patriotic
passions.
Mandiant noticed that pattern while monitoring attacks on the New York
Times last year blamed on another Chinese hacking group it labeled APT12.
Hacker activity began at around 8:00 a.m. Beijing time and usually lasted
through a standard workday.
The Rand Corporations Libicki said he wasnt aware of any comprehensive
studies, but that in such cases, most activity between malware embedded in
a compromised system and the malwares controllers takes place during
business hours in Beijings time zone.
Richard Forno, director of the University of Maryland Baltimore Countys
graduate cybersecurity program, and David Clemente, a cybersecurity expert
with independent analysis center Chatham House in London, said that
observation has been widely noted among cybersecurity specialists.
It would reflect the idea that this is becoming a more routine activity
and that they are quite methodical, Clemente said.
The PLAs Third Department is brimming with resources, according to studies
commissioned by the U.S. government, with 12 operation bureaus, three
research institutes, and an estimated 13,000 linguists, technicians and
researchers on staff. Its further reinforced by technical teams from
Chinas seven military regions spread across the country, and by the
militarys vast academic resources, especially the PLA University of
Information Engineering and the Academy of Military Sciences.
The PLA is believed to have made cyber warfare a key priority in its war-
fighting capabilities more than a decade ago. Among the few public
announcements of its development came in a May 25, 2011 news conference by
Defense Ministry spokesman Geng Yansheng, in which he spoke of developing
Chinas online army.
Currently, Chinas network protection is comparatively weak, Geng told
reporters, adding that enhancing information technology and strengthening
network security protection are important components of military training
for an army.
Unit 61398 is considered just one of many such units under the Third
Department responsible for hacking, according to experts.
Greg Walton, a cyber-security researcher who has tracked Chinese hacking
campaigns, said hes observed the Comment Crew at work, but cites as
equally active another Third Department unit operating out of the
southwestern city of Chengdu. It is tasked with stealing secrets from
Indian government security agencies and think tanks, together with the
India-based Tibetan Government in Exile, Walton said.
Another hacking outfit believed by some to have PLA links, the Elderwood
Group, has targeted defense contractors, human rights groups, non-
governmental organizations, and service providers, according to computer
security company Symantec.
Its believed to have compromised Amnesty Internationals Hong Kong website
in May 2012, although other attacks have gone after targets as diverse as
the Council on Foreign Relations and Capstone Turbine Corporation, which
makes gas microturbines for power plants.
Civilian departments believed to be involved in hacking include those under
the Ministry of Public Security, which commands the police, and the
Ministry of State Security, one of the leading clandestine intelligence
agencies. The MSS is especially suspected in attacks on foreign academics
studying Chinese social issues and unrest in the western regions of Tibet
and Xinjiang.
Below them on the hacking hierarchy are private actors, including civilian
universities and research institutes, state industries in key sectors such
as information technology and resources, and college students and other
individuals acting alone or in groups, according to analysts, University of
Marylands Forno said.
Chinas government isnt alone in being accused of cyber espionage, but
observers say it has outpaced its rivals in using military assets to steal
commercial secrets.
Stealing secrets is stealing secrets regardless of the medium, Forno
said. The key difference is that you cant easily arrest such electronic
thieves since theyre most likely not even in the country, which differs
from how the game was played during the Cold War.
--
And, another news report today ..
"BBC: World service frequencies jammed in China"
By AP News Feb 26, 2013 9:20AM UTC
<http://asiancorrespondent.com/99432/bbc-world-service-frequencies-jammed-
in-china/>
LONDON (AP) The BBC says it has received reports that its world service
English shortwave radio frequencies are being jammed in China and condemns
what it called efforts to disrupt free access to news and information...
Cheers,
Stephen
More information about the Link
mailing list