China Accused Of “Huge Hack” Of Thousands Of European Diplomatic Cables

Step side Russia: the new global hacking bogeyman is now officially China.

Just days after the US accused Beijing of hacking hundreds of millions of Marriott accounts and extracting the private data of countless Americans, even as the ongoing diplomatic feud over Chinese “intermediation” in western communications via the likes of Huawei escalates, moments ago the EU unveiled that China was now also the new Wikileaks, accusing hacker tied to China’s People’s Liberation Army of a “huge hack” of its diplomatic cables and reviving fears about vulnerabilities in the 28-country bloc’s data systems. Continue reading

China Launching More Sophisticated Cyber Attacks and Plans to Persist, Report Says

https://www.theepochtimes.com/assets/uploads/2018/09/26/GettyImages-675019440.jpg

The offices of PricewaterhouseCoopers in St. Helier, Jersey, U.K., on April 12, 2017. That month, China-based hackers attacked PwC through its IT service providers. (Matt Cardy/Getty Images)

 

China doesn’t plan to cease conducting commercial espionage that benefits the central government, even as the U.S. is rolling out new, proactive cyber strategies to counter threats from Beijing, a new report by an Australian think tank says.

Furthermore, China’s hacking capabilities have gotten more sophisticated, with the intention of making the hacking harder to detect, according to a new report by the Australian Strategic Policy Institute. Continue reading

China Industrial Policy Seeks to Steal ‘Crown Jewels’ of U.S. Tech

Xi Jinping

Getty Images

 

White House exposes Chinese economic aggression

China’s government is using a multi-pronged strategy to systematically steal advanced American technology as part of economic aggression against the United States, according to a White House report.

The report, based in part on declassified intelligence from the Pentagon and intelligence agencies, provides some of the first public details on China’s industrial policies that have produced the world’s second largest economy, often at the expense of American companies. Continue reading

How China’s cyber command is being built to supersede its U.S. military counterpart

Servicemen of the People’s Liberation Army of China during the military parade in commemoration of the 70th anniversary of the Victory in the Great Patriotic War of 1941-1945. (Wikicommons)

 

As U.S. leaders contemplate a proper definition for “cyberwar,” their counterparts in China have been building a unit capable of fighting such a large-scale conflict.

China’s rival to U.S. Cyber Command, the ambiguously named Strategic Support Force (SSF), is quietly growing at a time when the country’s sizable military is striving to excel in the digital domain.

Though the American government is widely considered to be one of the premier hacking powers — alongside Israel, Germany, Russia and the United Kingdom — China is rapidly catching up by following a drastically different model. Continue reading

China cyber espionage continues

U.S. Cyber Command recently reported within secret government channels that China is continuing aggressive cyber espionage against American companies.

An intelligence report disseminated earlier this month stated that one of China’s biggest cyber spying operations involved the theft of 1.65 terabytes of sensitive proprietary data from a major U.S. software company, according to a defense official familiar with the report.

The U.S. company was not identified by name. But the hacker group behind the data theft is part of the Ministry of State Security, China’s main police and intelligence service. Continue reading

Russia´s cyber-operations alter balance of power – tougher response called for

Russia is alterering the balance of power with superior human resources in the cyber-realm and a strategy and will to used them offensively, including via proxies – and lack of western response encourages escalation says Jarno Limnéll.

Cyber-narrative in the United States has changed during the last year. China and its economic cyber-espionage has been in the centre of narrative for years, but now politicians and especially the intelligence community emphasise Russia´s cyber-threat.

“Russian cyber-attacks rank as the greatest threat to the United States´ national security”, the US director of national Intelligence James Clapper has stated. Admiral Michael Rogers, director of NSA and commander of the US Cyber Command has publicly estimated that, “Russia has very capable cyber-operators who can and do work with speed, precision and stealth.” These statements were not made by coincidence. Continue reading

FBI Warns Nation-State Cyber Attacks Are Continuing

This will continue until America is either crippled beyond repair, or until America decides to abandon its “patch and pray” reactive measures that do almost nothing against future threats, and become proactive.

 

Government and private networks hit by sophisticated cyber espionage

Foreign government hackers are continuing to target U.S. government and private sector computer networks in sophisticated cyber attacks, the FBI warned in an alert sent this week.

“Advanced Persistent Threat (APT) cyber actors continue to target sensitive information stored on U.S. commercial and government networks through cyber espionage,” the FBI said in the May 11 notice.

The term “APT actor” is a euphemism for state-sponsored or highly sophisticated cyber attackers, usually involving connections to foreign militaries or intelligence services. Continue reading

FBI Warns of Cyber Threat to Electric Grid

DHS intel report downplayed cyber threat to power grid

Three months after a Department of Homeland Security intelligence report downplayed the threat of a cyber attack against the U.S. electrical grid, DHS and the FBI began a nationwide program warning of the dangers faced by U.S. utilities from damaging cyber attacks like the recent hacking against Ukraine’s power grid.

The nationwide campaign by DHS and the FBI began March 31 and includes 12 briefings and online webinars for electrical power infrastructure companies and others involved in security, with sessions in eight U.S. cities, including a session next week in Washington. Continue reading

Signs Point to China in US Research Facility Hack

Tech companies, healthcare giants, defense contractors, top universities, the US government—you name it, Chinese cyber-spies have probably hacked it. And now, it seems likely, we can add one of the world’s preeminent marine research groups to the list.

Woods Hole Oceanographic Institution sustained a “sophisticated, targeted attack” that looks to have originated from China, according to Christopher Land, the organization’s general counsel and leader of its internal investigation. Continue reading

China’s Copycat Jet Raises Questions About F-35

https://i0.wp.com/www.defenseone.com/media/ckeditor-uploads/2015/09/23/j-31-vs-f-35_.png

 

Did the Chinese theft of data on the US fighter jet and other weapons shrink the Pentagon’s technical superiority?

China’s twin-engine design bears a striking resemblance to the single-jet F-35. Still, the Joint Strike Fighter is expected to fly slightly farther and carry a heavier load of weapons, according to the data, which was first reported by Jane’s.

Military experts say that while the J-31 looks like, and may even fly like, the F-35, it’s what’s under the hood and embedded in the skin that really matters. The U.S. has the better computer software, unique sensors and other hardware, stealth coating, and engines technology—all critical attributes that make fifth-generation aircraft different than the military jets of last century. Continue reading

The Next Wave of Cyberattacks Won’t Steal Data — They’ll Change It

The big attacks that have been disclosed so far in 2015 involved the theft of data, and a lot of it. Some 21 million personnel records were taken from the Office of Personnel Management, likely by China, while 4,000 records, some with “sensitive” information, were stolen from the Joint Chiefs civilian email system, a theft blamed on Russia.

But America’s top spies say the attacks that worry them don’t involve the theft of data, but the direct manipulation of it, changing perceptions of what is real and what is not.

Director of National Intelligence James Clapper spelled out his concerns in written testimony presented to the House Subcommittee on Intelligence today. Continue reading

The New German Arrogance (II)

Germany knows controlling the flow of information is key, therefore it is now capturing the cyber realm. This, plus taking steps towards an EU Army, forcing further integration of EU member states and turning them into vassal states (i.e. Cyprus) are all key actions/characteristics of a nation striving to be a world superpower. Germany is now directly competing against the United States. The Fourth Reich has (almost) landed.

 

BERLIN/WASHINGTON/VIENNA (Own report) – In cooperation with NSA, a US military intelligence service, the German Federal Intelligence Service (BND) has massively intercepted and stored emails from Austria, Luxembourg and the Czech Republic. This became evident through an internal email from an employee of the Deutsche Telekom AG, responsible for cooperation with the intelligence service and police. According to the email, published by the Austrian parliamentarian Peter Pilz, Telekom, already in early February 2005, had given a green light to the BND having access to a fiber optic cable for internet communication connecting Luxembourg to Austria and numerous other countries. At the time, Frank-Walter Steinmeier (SPD), as Head of the Federal Chancellery, bore the highest responsibility for the activities of the BND. According to reports, Austria’s domestic intelligence was also being tapped. Whoever is cognizant of this communication, knows “almost everything about the Republic’s political life,” summarized Pilz. The governments concerned have raised no serious protests, in the Germany-dominated EU. The German government is continuing the BND’s technological upgrading, aimed ultimately toward raising German espionage “to an equal footing” with the NSA – also in internet spying.

Continue reading

Cyber war intensifies between China and US

An intensifying cyber security war between the United States and China highlights mutual strategic suspicion between the two countries, according to a research paper recently published the Center for a New American Security, a Washington-based think tank on China’s cyber security strategy.

The paper said that while the internet has caused an unprecedented impact on China’s traditional financial and media sectors, the biggest task for Beijing is taking innovation and cyber security into consideration while mapping out regulations for internet supervision and governance. Continue reading

Stealthy spy software snooping for years: Symantec

The malicious software, dubbed Regin, has a rare level of sophistication and has been targeting government agencies, telecoms, utilities, airlines, research facilities, private individuals and others since at least 2008, according to Symantec Corporation.

Attacks on telecom firms appeared aimed at getting access to calls being routed through networks.

“Regin is a highly complex threat which has been used in systematic data collection or intelligence gathering campaigns,” the Silicon Valley-based computer security firm said in a paper detailing the threat. Continue reading

China is no refuge from Obama’s woes

Beijing sees the US president as a weak leader in the autumn of his presidency

Second-term US presidents traditionally seek solace on the global stage. Barack Obama is no exception. Following last week’s drubbing in the US midterm elections, he lands in China on Monday for a summit with Xi Jinping. He is unlikely to find Beijing more pliable than Washington DC. As time goes on, it becomes ever harder to separate his domestic weakness from his global standing. Even the tone is spreading. “US society has grown tired of [Obama’s] banality,” China’s semi-official Global Times said last week. Continue reading