Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

jsr

(7,712 posts)
Tue Feb 19, 2013, 12:17 AM Feb 2013

Chinese Army Unit Is Seen as Tied to Hacking Against U.S.

Source: New York Times

On the outskirts of Shanghai, in a run-down neighborhood dominated by a 12-story white office tower, sits a People’s Liberation Army base for China’s growing corps of cyberwarriors.

The building off Datong Road, surrounded by restaurants, massage parlors and a wine importer, is the headquarters of P.L.A. Unit 61398. A growing body of digital forensic evidence — confirmed by American intelligence officials who say they have tapped into the activity of the army unit for years — leaves little doubt that an overwhelming percentage of the attacks on American corporations, organizations and government agencies originate in and around the white tower.

An unusually detailed 60-page study, to be released Tuesday by Mandiant, an American computer security firm, tracks for the first time individual members of the most sophisticated of the Chinese hacking groups — known to many of its victims in the United States as “Comment Crew” or “Shanghai Group” — to the doorstep of the military unit’s headquarters. The firm was not able to place the hackers inside the 12-story building, but makes a case there is no other plausible explanation for why so many attacks come out of one comparatively small area.

“Either they are coming from inside Unit 61398,” said Kevin Mandia, the founder and chief executive of Mandiant, in an interview last week, “or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”


Read more: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html

13 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies

Response to jsr (Original post)

Hugabear

(10,340 posts)
11. Good idea. I nominate you to carry out the mission.
Tue Feb 19, 2013, 04:43 PM
Feb 2013

If you're advocating something that could very well touch off a shooting war, then surely you'd be willing to stand up for your country and carry out this mission.

Kolesar

(31,182 posts)
9. Software that gives oil and gas pipeline companies and power grid operators remote access ...
Tue Feb 19, 2013, 08:19 AM
Feb 2013

But the most troubling attack to date, security experts say, was a successful invasion of the Canadian arm of Telvent. The company, now owned by Schneider Electric, designs software that gives oil and gas pipeline companies and power grid operators remote access to valves, switches and security systems.

Telvent keeps detailed blueprints on more than half of all the oil and gas pipelines in North and South America, and has access to their systems. In September, Telvent Canada told customers that attackers had broken into its systems and taken project files. That access was immediately cut, so that the intruders could not take command of the systems.

Martin Hanna, a Schneider Electric spokesman, did not return requests for comment, but security researchers who studied the malware used in the attack, including Mr. Stewart at Dell SecureWorks and Mr. Blasco at AlienVault, confirmed that the perpetrators were the Comment Crew.

“This is terrifying because — forget about the country — if someone hired me and told me they wanted to have the offensive capability to take out as many critical systems as possible, I would be going after the vendors and do things like what happened to Telvent,“ Mr. Peterson of Digital Bond said. “It’s the holy grail.”

Kolesar

(31,182 posts)
10. Mandiant's complete report is linked *here* from Business Insider
Tue Feb 19, 2013, 03:48 PM
Feb 2013

Mandiant says it felt compelled to expose this hack despite possibly compromising its ability to collect information. Here's why:


"The decision to publish a significant part of our intelligence about Unit 61398 was a painstaking one. What started as a “what if” discussion about our traditional non-disclosure policy quickly turned into the realization that the positive impact resulting from our decision to expose APT1 outweighed the risk to our ability to collect intelligence on this particular APT group.
It is time to acknowledge the threat is originating in China, and we wanted to do our part to arm and prepare security professionals to combat that threat effectively. The issue of attribution has always been a missing link in publicly understanding the landscape of APT cyber espionage. Without establishing a solid connection to China, there will always be room for observers to dismiss APT actions as uncoordinated, solely criminal in nature, or peripheral to larger national security and global economic concerns.

...MORE...



http://www.businessinsider.com/mandiant-report-chinese-hacking-explained-how-it-really-works-full-report-downloaded-highlights-2013-2

Left Coast2020

(2,397 posts)
12. Hit them back in a way they understand.....
Tue Feb 19, 2013, 05:08 PM
Feb 2013

Cut into what effects their wallet. They know that language really well. Raise tarrifs and other financial measures. Maybe they will get a hint not to fuck with us.

Kolesar

(31,182 posts)
13. Anonymous Helps Researchers Link Hackers To Chinese Army
Tue Feb 19, 2013, 10:45 PM
Feb 2013
http://www.huffingtonpost.com/2013/02/19/anonymous-hackers-chinese-army_n_2717352.html

In February 2011, Anonymous gained access to the website rootkit.com -- an online forum where hackers and researchers share information about hacking techniques -- and published personal data of more than 40,000 registered users online. The data included email and IP addresses.

The breach was one of dozens by Anonymous over the past two years and gained relatively little media attention. But now, two years later, security researchers say the data was valuable in helping them find links between hackers and the Chinese military.

"We are fortunate to have access to the accounts disclosed from rootkit.com," the Mandiant report said.
Latest Discussions»Latest Breaking News»Chinese Army Unit Is Seen...