Step side Russia: the new global hacking bogeyman is now officially China.
Just days after the US accused Beijing of hacking hundreds of millions of Marriott accounts and extracting the private data of countless Americans, even as the ongoing diplomatic feud over Chinese “intermediation” in western communications via the likes of Huawei escalates, moments ago the EU unveiled that China was now also the new Wikileaks, accusing hacker tied to China’s People’s Liberation Army of a “huge hack” of its diplomatic cables and reviving fears about vulnerabilities in the 28-country bloc’s data systems. Continue reading
China doesn’t plan to cease conducting commercial espionage that benefits the central government, even as the U.S. is rolling out new, proactive cyber strategies to counter threats from Beijing, a new report by an Australian think tank says.
Furthermore, China’s hacking capabilities have gotten more sophisticated, with the intention of making the hacking harder to detect, according to a new report by the Australian Strategic Policy Institute. Continue reading
White House exposes Chinese economic aggression
China’s government is using a multi-pronged strategy to systematically steal advanced American technology as part of economic aggression against the United States, according to a White House report.
The report, based in part on declassified intelligence from the Pentagon and intelligence agencies, provides some of the first public details on China’s industrial policies that have produced the world’s second largest economy, often at the expense of American companies. Continue reading
As U.S. leaders contemplate a proper definition for “cyberwar,” their counterparts in China have been building a unit capable of fighting such a large-scale conflict.
China’s rival to U.S. Cyber Command, the ambiguously named Strategic Support Force (SSF), is quietly growing at a time when the country’s sizable military is striving to excel in the digital domain.
Though the American government is widely considered to be one of the premier hacking powers — alongside Israel, Germany, Russia and the United Kingdom — China is rapidly catching up by following a drastically different model. Continue reading
U.S. Cyber Command recently reported within secret government channels that China is continuing aggressive cyber espionage against American companies.
An intelligence report disseminated earlier this month stated that one of China’s biggest cyber spying operations involved the theft of 1.65 terabytes of sensitive proprietary data from a major U.S. software company, according to a defense official familiar with the report.
The U.S. company was not identified by name. But the hacker group behind the data theft is part of the Ministry of State Security, China’s main police and intelligence service. Continue reading
Russia is alterering the balance of power with superior human resources in the cyber-realm and a strategy and will to used them offensively, including via proxies – and lack of western response encourages escalation says Jarno Limnéll.
Cyber-narrative in the United States has changed during the last year. China and its economic cyber-espionage has been in the centre of narrative for years, but now politicians and especially the intelligence community emphasise Russia´s cyber-threat.
“Russian cyber-attacks rank as the greatest threat to the United States´ national security”, the US director of national Intelligence James Clapper has stated. Admiral Michael Rogers, director of NSA and commander of the US Cyber Command has publicly estimated that, “Russia has very capable cyber-operators who can and do work with speed, precision and stealth.” These statements were not made by coincidence. Continue reading
This will continue until America is either crippled beyond repair, or until America decides to abandon its “patch and pray” reactive measures that do almost nothing against future threats, and become proactive.
Government and private networks hit by sophisticated cyber espionage
Foreign government hackers are continuing to target U.S. government and private sector computer networks in sophisticated cyber attacks, the FBI warned in an alert sent this week.
“Advanced Persistent Threat (APT) cyber actors continue to target sensitive information stored on U.S. commercial and government networks through cyber espionage,” the FBI said in the May 11 notice.
The term “APT actor” is a euphemism for state-sponsored or highly sophisticated cyber attackers, usually involving connections to foreign militaries or intelligence services. Continue reading
DHS intel report downplayed cyber threat to power grid
Three months after a Department of Homeland Security intelligence report downplayed the threat of a cyber attack against the U.S. electrical grid, DHS and the FBI began a nationwide program warning of the dangers faced by U.S. utilities from damaging cyber attacks like the recent hacking against Ukraine’s power grid.
The nationwide campaign by DHS and the FBI began March 31 and includes 12 briefings and online webinars for electrical power infrastructure companies and others involved in security, with sessions in eight U.S. cities, including a session next week in Washington. Continue reading
Tech companies, healthcare giants, defense contractors, top universities, the US government—you name it, Chinese cyber-spies have probably hacked it. And now, it seems likely, we can add one of the world’s preeminent marine research groups to the list.
Woods Hole Oceanographic Institution sustained a “sophisticated, targeted attack” that looks to have originated from China, according to Christopher Land, the organization’s general counsel and leader of its internal investigation. Continue reading
Did the Chinese theft of data on the US fighter jet and other weapons shrink the Pentagon’s technical superiority?
China’s twin-engine design bears a striking resemblance to the single-jet F-35. Still, the Joint Strike Fighter is expected to fly slightly farther and carry a heavier load of weapons, according to the data, which was first reported by Jane’s.
Military experts say that while the J-31 looks like, and may even fly like, the F-35, it’s what’s under the hood and embedded in the skin that really matters. The U.S. has the better computer software, unique sensors and other hardware, stealth coating, and engines technology—all critical attributes that make fifth-generation aircraft different than the military jets of last century. Continue reading
The big attacks that have been disclosed so far in 2015 involved the theft of data, and a lot of it. Some 21 million personnel records were taken from the Office of Personnel Management, likely by China, while 4,000 records, some with “sensitive” information, were stolen from the Joint Chiefs civilian email system, a theft blamed on Russia.
But America’s top spies say the attacks that worry them don’t involve the theft of data, but the direct manipulation of it, changing perceptions of what is real and what is not.
Director of National Intelligence James Clapper spelled out his concerns in written testimony presented to the House Subcommittee on Intelligence today. Continue reading
Germany knows controlling the flow of information is key, therefore it is now capturing the cyber realm. This, plus taking steps towards an EU Army, forcing further integration of EU member states and turning them into vassal states (i.e. Cyprus) are all key actions/characteristics of a nation striving to be a world superpower. Germany is now directly competing against the United States. The Fourth Reich has (almost) landed.
An intensifying cyber security war between the United States and China highlights mutual strategic suspicion between the two countries, according to a research paper recently published the Center for a New American Security, a Washington-based think tank on China’s cyber security strategy.
The paper said that while the internet has caused an unprecedented impact on China’s traditional financial and media sectors, the biggest task for Beijing is taking innovation and cyber security into consideration while mapping out regulations for internet supervision and governance. Continue reading
The malicious software, dubbed Regin, has a rare level of sophistication and has been targeting government agencies, telecoms, utilities, airlines, research facilities, private individuals and others since at least 2008, according to Symantec Corporation.
Attacks on telecom firms appeared aimed at getting access to calls being routed through networks.
“Regin is a highly complex threat which has been used in systematic data collection or intelligence gathering campaigns,” the Silicon Valley-based computer security firm said in a paper detailing the threat. Continue reading
Beijing sees the US president as a weak leader in the autumn of his presidency
Second-term US presidents traditionally seek solace on the global stage. Barack Obama is no exception. Following last week’s drubbing in the US midterm elections, he lands in China on Monday for a summit with Xi Jinping. He is unlikely to find Beijing more pliable than Washington DC. As time goes on, it becomes ever harder to separate his domestic weakness from his global standing. Even the tone is spreading. “US society has grown tired of [Obama’s] banality,” China’s semi-official Global Times said last week. Continue reading