Step side Russia: the new global hacking bogeyman is now officially China.
Just days after the US accused Beijing of hacking hundreds of millions of Marriott accounts and extracting the private data of countless Americans, even as the ongoing diplomatic feud over Chinese “intermediation” in western communications via the likes of Huawei escalates, moments ago the EU unveiled that China was now also the new Wikileaks, accusing hacker tied to China’s People’s Liberation Army of a “huge hack” of its diplomatic cables and reviving fears about vulnerabilities in the 28-country bloc’s data systems. Continue reading
In order to save face over an investigation that has failed to produce a smoking gun regarding charges of collusion between the Trump campaign and Russia, the US elite have opted to indict Russian intelligence officials for election meddling. Yet the evidence, once again, is missing in action.
Amid harsh criticism at home for its failure to provide proof of Russian collusion in the 2016 presidential election, at the very same time that Trump is preparing to meet with Vladimir Putin for a summit in Helsinki, the US Deep State has resorted to playing spoiler with the most overplayed hand in modern political history: the ‘Blame Russia’ card.
On Friday, Deputy Attorney General Rod Rosenstein announced indictments against 12 members of Russia’s Main Intelligence Directorate of the General Staff, also known as GRU, for “conspiring to interfere with the 2016 presidential election.” Continue reading
Meanwhile, President Obama is pushing America closer to war with Russia based on faulty intelligence, or what’s likely worse: fabricated intelligence.
The FBI may have been forced into a misstep when investigating whether Russia hacked the Democratic National Committee — the agency never directly examined the DNC servers that were breached.
Instead, the FBI had to rely on forensic evidence provided by third-party cybersecurity firm CrowdStrike, which the DNC hired to mitigate the breach.
“The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed,” the agency said on Thursday in a statement. Continue reading
Chinese government hackers have attempted in the past few weeks to penetrate the networks of U.S. companies to steal their secrets despite a pledge by China’s president that they would not do so, according to private researchers.
Chinese hackers have targeted at least seven U.S. companies since President Xi Jinping vowed last month in Washington that his country would not conduct cyber-economic espionage — the theft of trade secrets and intellectual property for the benefit of the nation’s industries, according to CrowdStrike, a firm that helps companies track and prevent intrusions.
In the three weeks since Xi left Washington — including the day after he left, on Sept. 26 — hackers linked to the Chinese government have attempted to gain access to tech and pharmaceutical companies’ networks, said Dmitri Alperovitch, CrowdStrike co-founder and chief technology officer, who released a report on the issue Monday. Continue reading
According to CrowdStrike founder Dmitri Alperovitch, Chinese hackers are using information gained from the breaches of the U.S. Office of Personnel Management, as well as intrusions into the Anthem and CareFirst BlueCross BlueShield health insurance networks, to build a complete profile of federal employees in what the company calls a “Facebook of Everything.”
As Fox News has reported, the most sensitive information stolen in the OPM breach was lifted from what is known as the Standard Form 86, or SF-86. The 127-page security clearance application is essentially a road map to your life. It contains highly detailed information on everything from where an applicant lived and worked, to personal references, family members, friends and associates, as well as drug history and intimate health information. Continue reading
San Francisco: A private US cyber-security company on Monday accused a unit of China’s military of conducting far-reaching hacking operations to advance the country’s satellite and aerospace programs.
Security company CrowdStrike said Shanghai-based unit 61486 of the People’s Liberation Army 12th bureau has attacked networks of Western government agencies and defence contractors since 2007.
CrowdStrike said the hacking targeted the US space, aerospace and communications sectors. The cyberspying targeted “popular productivity applications such as Adobe Reader and Microsoft Office to deploy custom malware through targeted email attacks,” CrowdStrike said. Continue reading