Chinese hackers seen as increasingly professional



CHRISTOPHER BODEEN | AP

Published — Tuesday 26 February 2013

Last update 26 February 2013 4:38 pm

| نسخة PDF Print News | A A

BEIJING: Beijing hotly denies accusations of official involvement in massive cyberattacks against foreign targets, insinuating such activity is the work of rogues. But at least one piece of evidence cited by experts points to professional cyberspies: China’s hackers don’t work weekends.
Accusations of state-sanctioned hacking took center stage this past week following a detailed report by a US-based Internet security firm Mandiant. It added to growing suspicions that the Chinese military is not only stealing national defense secrets and harassing dissidents but also pilfering information from foreign companies that could be worth millions or even billions of dollars.
Experts say Chinese hacking attacks are characterized not only by their brazenness, but by their persistence.
“China conducts at least an order of magnitude more than the next country,” said Martin Libicki, a specialist on cyber warfare at the Rand Corporation, based in Santa Monica, California. The fact that hackers take weekends off suggests they are paid, and that would belie “the notion that the hackers are private,” he said.
Libicki and other cyber warfare experts have long noted a Monday-through-Friday pattern in the intensity of attacks believed to come from Chinese sources, though there has been little evidence released publicly directly linking the Chinese military to the attacks.
Mandiant went a step further in its report Tuesday saying that it had traced hacking activities against 141 foreign entities in the US Canada, Britain and elsewhere to a group of operators known as the “Comment Crew” or “APT1,” for “Advanced Persistent Threat 1,” which it traced back to the People’s Liberation Army Unit 61398. The unit is headquartered in a nondescript 12-story building inside a military compound in a crowded suburb of China’s financial hub of Shanghai.
Attackers stole information about pricing, contract negotiations, manufacturing, product testing and corporate acquisitions, the company said.
Hacker teams regularly began work, for the most part, at 8 a.m. Beijing time. Usually they continued for a standard work day, but sometimes the hacking persisted until midnight. Occasionally, the attacks stopped for two-week periods, Mandiant said, though the reason was not clear.
China denies any official involvement, calling such accusations “groundless” and insisting that Beijing is itself a major victim of hacking attacks, the largest number of which originate in the US While not denying hacking attacks originated in China, Foreign Ministry spokesman Hong Lei said Thursday that it was flat out wrong to accuse the Chinese government or military of being behind them.
Mandiant and other experts believe Unit 61398 to be a branch of the PLA General Staff’s Third Department responsible for collection and analysis of electronic signals such as e-mails and phone calls. It and the Fourth Department, responsible for electronic warfare, are believed to be the PLA units mainly responsible for infiltrating and manipulating computer networks.
China acknowledges pursuing these strategies as a key to delivering an initial blow to an opponent’s communications and other infrastructure during wartime — but the techniques are often the same as those used to steal information for commercial use.
China has consistently denied state-sponsored hacking, but experts say the office hours that the cyberspies keep point to a professional army rather than mere hobbyists or so-called “hacktivists” inspired by patriotic passions.
Mandiant noticed that pattern while monitoring attacks on the New York Times last year blamed on another Chinese hacking group it labeled APT12. Hacker activity began at around 8:00 a.m. Beijing time and usually lasted through a standard workday.
The Rand Corporation’s Libicki said he wasn’t aware of any comprehensive studies, but that in such cases, most activity between malware embedded in a compromised system and the malware’s controllers takes place during business hours in Beijing’s time zone.
Richard Forno, director of the University of Maryland Baltimore County’s graduate cybersecurity program, and David Clemente, a cybersecurity expert with independent analysis center Chatham House in London, said that observation has been widely noted among cybersecurity specialists.
“It would reflect the idea that this is becoming a more routine activity and that they are quite methodical,” Clemente said.
The PLA’s Third Department is brimming with resources, according to studies commissioned by the US government, with 12 operation bureaus, three research institutes, and an estimated 13,000 linguists, technicians and researchers on staff. It’s further reinforced by technical teams from China’s seven military regions spread across the country, and by the military’s vast academic resources, especially the PLA University of Information Engineering and the Academy of Military Sciences.
The PLA is believed to have made cyber warfare a key priority in its war-fighting capabilities more than a decade ago. Among the few public announcements of its development came in a May 25, 2011 news conference by Defense Ministry spokesman Geng Yansheng, in which he spoke of developing China’s “online” army.
“Currently, China’s network protection is comparatively weak,” Geng told reporters, adding that enhancing information technology and “strengthening network security protection are important components of military training for an army.”
Unit 61398 is considered just one of many such units under the Third Department responsible for hacking, according to experts.
Greg Walton, a cyber-security researcher who has tracked Chinese hacking campaigns, said he’s observed the “Comment Crew” at work, but cites as equally active another Third Department unit operating out of the southwestern city of Chengdu. It is tasked with stealing secrets from Indian government security agencies and think tanks, together with the India-based Tibetan Government in Exile, Walton said.
Another hacking outfit believed by some to have PLA links, the “Elderwood Group,” has targeted defense contractors, human rights groups, non-governmental organizations, and service providers, according to computer security company Symantec.
It’s believed to have compromised Amnesty International’s Hong Kong website in May 2012, although other attacks have gone after targets as diverse as the Council on Foreign Relations and Capstone Turbine Corporation, which makes gas microturbines for power plants.
Civilian departments believed to be involved in hacking include those under the Ministry of Public Security, which commands the police, and the Ministry of State Security, one of the leading clandestine intelligence agencies. The MSS is especially suspected in attacks on foreign academics studying Chinese social issues and unrest in the western regions of Tibet and Xinjiang.
Below them on the hacking hierarchy are private actors, including civilian universities and research institutes, state industries in key sectors such as information technology and resources, and college students and other individuals acting alone or in groups, according to analysts, University of Maryland’s Forno said.
China’s government isn’t alone in being accused of cyber espionage, but observers say it has outpaced its rivals in using military assets to steal commercial secrets.
“Stealing secrets is stealing secrets regardless of the medium,” Forno said. “The key difference is that you can’t easily arrest such electronic thieves since they’re most likely not even in the country, which differs from how the game was played during the Cold War.”

What's happening around Saudi Arabia

SYDNEY: Amnesty International has demanded that Mustafa Al-Hosawi, a Saudi prisoner at Guantanamo Bay in Cuba, be treated for the torture he underwent at the hands of the CIA.The US branch of the organization sent a message to health officials at the...
JEDDAH: The city’s airport staff saved a 20-year-old woman who tried to throw herself from the upper floor to the mezzanine floor in the southern hall. Sources said the suicide attempt was due to family disputes. Administrators said a supervisor in t...
RIYADH: Education Minister Ahmad Al-Issa has ordered to gradually close down private night schools beginning from the current year. The closure of these schools will be complete by 1439H.Al-Issa’s decision is based on reports of a body, which highlig...
RIYADH: A cross-section of Saudi society on Friday denounced the Jazan massacre that shook the nation on Thursday, when a gunman went on the rampage killing seven education officials and injuring several others in Al-Dair governorate.The culprit, ide...
JEDDAH: Maj. Gen. Awad Al-Balawi, head of the Saudi Border Guard, recently confirmed the expansion of the employment program for women within the border security sector. He said that the sector is entering a new phase as women will be employed in a n...
RIYADH: A medical team of the King Abdullah Specialist Children’s Hospital (KASCH) at the King Abdulaziz Medical City (National Guard) here have successfully conducted the first liver transplant on a baby boy. Fahad Mari Said Al-Sairdh, father of the...
JEDDAH: The Makkah Investigation and Prosecution Board reintroduced the crane crash incident to the Riyadh Investigation and Prosecution Board recently, adding 10 more employees and supervisors from different government agencies before the courts. Th...
JEDDAH: The teacher who gunned down seven education officials in Al-Dair governorate on Thursday had been showing behavioral problems in recent days, Al-Janob Misfer Al-Subhan, director of King Faisal Secondary School in Dharan, was quoted as saying...
JEDDAH: The Human Rights Commission (HRC) is investigating the Nakheel Mall case, in which a girl was beaten up by a group of Haia members, an official of the commission has said. “The HRC is supposed to guarantee the rights of those harmed, whoever...
AL-AHSA: King Faisal University (KFU) in Al-Ahsa is currently studying the possibility of admitting female students to specialize in veterinary medicine, the director of the university, Dr. Abdulaziz Al-Saati, confirmed. He said the matter has been p...
JEDDAH: A fingerprinting campaign, titled “Imprint Homeland,” against extremism and terrorism, was launched at the Jeddah corniche on Thursday night. The drive will cover all the 17 regions of Makkah province.The campaign, initiated by the Makkah gov...
RIYADH: The number of unemployed Saudi nationals reached 647,000 by the end of last year, of whom 56 percent, or 363,800, hold bachelor’s degrees or licenses. Female bachelor’s degree and license holders accounted for three-fourths of unemployed Saud...
RIYADH: Four citizens have been arrested in two murder cases, one of which was a road rage. One of the suspects resisted arrest and even opened fire on the police, but no one was injured.According to the Riyadh police, a clinic informed them that it...
MAKKAH: Thirty percent of male middle school students and 23 percent of female students take some form of drugs, a recent scientific study from the National Center for Youth Research confirmed. The study shows drug consumption rates among students in...
RIYADH: Several government departments participating in a campaign to fight breast cancer in the Eastern Province will offer their recommendations to the Ministry of the Interior to include breast cancer checks for women aged 40 and above as part of...

Stay Connected

Facebook