War 2.0: China Suspected in Massive Cyberattack on U.N., U.S. Gov't, and More
August 3, 2011 3:50 PM
comment(s) - last by
China is suspected in a record setting hack, which affected many nations over the last five years.
(Source: Army Recognition)
The attack is believed to have done tremendous financial damage to those affected and given a financial boost to the attacker.
The attacks largely target the U.S. -- which has weak cyber-security, but also targeted Asian nations, Canada, and several European nations.
Attack "raped and pillaged" 72 organizations over 5 years
) subsidiary McAfee, has
just gone public
[declassified report] with an incredible study into what it says is the world's biggest organized computer hack in history. The attack, which it dubs "Operation Shady RAT" (RAT stands for remote access tool), began in mid-2006 and was still ongoing at the start of this year. And unsurprisingly, China -- arguably the world's foremost cyber-superpower -- is suspected as the guilty party.
I. U.S. and Others Get "Raped and Pillaged"
McAfee's vice president of threat research, Dmitri Alperovitch, in
, comments, "Companies and government agencies are getting raped and pillaged every day. They are losing economic advantage and national secrets to unscrupulous competitors. This is the biggest transfer of wealth in terms of intellectual property in history. The scale at which this is occurring is really, really frightening."
In his report he describes how a team of savvy hackers organized by a "state actor" infiltrated 72 carefully selected government and corporate systems around the world and began rapidly stealing valuable information.
Government victims included United States, Taiwan, India, South Korea, Vietnam, and Canada. A number of multinational organizations including the Association of Southeast Asian Nations (ASEAN), the International Olympic Committee (IOC), the World Anti-Doping Agency, and the United Nations. Numerous defense contractors and high-tech companies were also infiltrated in the U.S. and abroad.
In one of the highest profile attacks -- the infiltration of the United Nations' servers, the attacker gained access to systems belonging to the secretariat in Geneva in 2008 and then proceeded to lurk for two years, stealing valuable classified documents.
The longest attack appears to have targeted the Olympic committee of an unnamed South Asian nation, last 28 months. Many of the attacks were far briefer lasting only a month.
The sophisticated plot was discovered when McAfee researchers reviewing the server logs on affected U.S. contractors discovered that they were all communicating with common command-and-control servers in the unnamed attacker nation.
Mr. Alperovitch recalls the shock at this discovery, writing, "Even we were surprised by the enormous diversity of the victim organizations and were taken aback by the audacity of the perpetrators. What is happening to all this data ... is still largely an open question. However, if even a fraction of it is used to build better competing products or beat a competitor at a key negotiation (due to having stolen the other team's playbook), the loss represents a massive economic threat."
II. The Red Dragon
Unsurprisingly most suspect China, given who was attacked and the nation's long history of cyberaggression [
Neither China or McAfee have officially commented on this possibility. But the timing lines up remarkably.
The attacks on the IOC and Olympic committee were executed in 2008, right before
the Beijing Olympics
. Given China's obsessive interest in topping its foreign competitors in the medal counts, there's a clear motive for the hacks, as they could have filled in secret details on when the Olympic officials planned to conduct drug tests. In theory China could have used the data to game the system, obfuscating steroid use or other types of cheating.
The attacks also were very focused on southeast Asia. South Korea, Japan, and Taiwan -- key economic rivals of China were all targeted.
In Taiwan's case, the attack may have served a double purpose, as China views Taiwan as a rebel province and has long looked for ways to undermine it economically and politically.
Jim Lewis, a cyber expert with the Center for Strategic and International Studies, states, "Everything points to China. It could be the Russians, but there is more that points to China than Russia."
One unnamed briefed expert affirms that the classified version of the information McAfee presented points to China.
III. Preying on the Weak
If the attacks were indeed the work of the Chinese government or its contractors, it scored a massive win economically. It's unknown what if any sort of punishment can be brought against the nation, as even if the evidence points to China, in such matters it's hard to conclusively prove the origin of an attack.
Further, many of the affected nations like the U.S. owe vast amounts of debt to the Chinese government and depend on China to support their
rare mineral resource
Many view China's recent actions as the strong of cyberspace picking on the weak. The U.S. is among those that has been
perceived as a "cyberweakling"
Vijay Mukhi, a cyber-expert based in India, states, "I'm not surprised because that's what China does, they are gradually dominating the cyberworld. I would call it child's play (for a hacker to get access to Indian government data) ... I would say we're in the stone age."
The report, which coincided with the
annual Black Hat security convention
in Las Vegas, took many by surprise.
Taiwanese officials said they were not aware of being part of a broader attack, though they said they were aware of many attacks against their government servers. U.N. officials also reported being unaware of the intrusion, though they were investigating. And the government of India refused to comment on whether it was aware of the attack on its government servers.
Japan seemed the least surprised, indicating knowledge of the attack, while emphasizing the uncertainty about who was behind the attacks. They say that they are conducting and investigation and working on "finalizing some guidelines. We aim to raise the security level as a whole and build a partnership between private sector organizations where information can be shared to prevent such attacks."
McAfee has informed all 72 companies who were attacked. In its public version of the report, it redacted the affected corporate parties' names, though it mentioned what nation and what business sector they were in.
Full details of the record setting assault are still not available, and may never be available. If McAfee is to be believed, though, the financial impact is likely enormous. The attack likely puts the affected governments, including the U.S. in panic mode. The pressing question -- how to improve their security so these attacks don't happen, and how to bring to justice an attacker who wields tremendous international financial power, should a breach occur.
This article is over a month old, voting and posting comments is disabled
The scary thing about China's Noocular capability.....
8/4/2011 12:53:28 AM
......isn't their ICBM's or nuclear sub capability. The U.S. and/or Russia would hand China their ass in an old school nuclear exchange.
No, the scary thing about China's nuclear arsenal are the number of small, tactical devices stashed in warehouses stateside and docked in U.S. harbors as I write this.
San Diego, Porland, OR, Seattle, Houston, Baton Rouge, half the eastern sea board - gone in the wink of an eye. Hopefully, if it comes to that, the sackless American government will use what little balls they have left to saturate mainland China from stem to stern, nuclear, biological and chemical.
Doubt it, though. I'm sure those shitheads in D.C. would prefer to "talk it out". The U.S. would roll over any other third world nation, but we seem willing to bend over forwards to accommodate our Chinese handlers. We can thank Al Gore for that. He pretty much gave the Chinese the keys to the White House back in the mid 90's. Bought him a really sweet little bungalow, down on the beach in Cali, though, so, you know, it was all worth it. Douche.
No, boys and girls, the good 'ol U.S.of A. is pretty much circling the bowl at this late stage of the game. The American people, hell the whole world, for that matter, have been sold down the river by a bunch of money grubbing, lecherous, homunculus, inbred pussies (see "U.S. Congress", "Supreme Court", "Executive Branch", "Wall Street"). The U.S. government can't cut it on the world stage with the big boys (economically, intellectually, or ethically), so they spend their time, our money and our children's lives beating up on third world shit holes or cannibalizing our citizenry to populate the American gulag.
Damn. Think I jumped the track. When I started this, I was all pissed at the Chinese. Now, I'm all disgusted with the government in THIS country. It's getting so's I barely know who to hate, anymore........
RE: The scary thing about China's Noocular capability.....
8/4/2011 3:23:36 AM
you sound insane
RE: The scary thing about China's Noocular capability.....
8/4/2011 3:13:20 PM
And sometimes, Glenn, I may even BE insane. It's fun, though, try it sometime. You might like it.
Sanity is an artifact of definition.
Morality is an artifact of consensus.
Reality is an artifact of its own observation.
"I modded down, down, down, and the flames went higher." -- Sven Olsen
Chinese Hackers Score Heist of 35 Million South Koreans' Personal Info
July 28, 2011, 9:43 AM
"Pwnies" are the Grammies of the Hacker World
July 27, 2011, 4:21 PM
Cheap Labor in China Coming to an End
June 20, 2011, 10:52 AM
China Threatens Google for Speaking Out Against Cyberattacks
June 6, 2011, 9:44 AM
Reports: Hackers Use Stolen RSA Information to Hack Lockheed Martin
May 30, 2011, 10:14 AM
Apple Adds New Password Protection for Third Party iCloud Apps
September 17, 2014, 8:50 PM
Facebook Tests Moments App, Aims to Keep Your Private Memories Private
September 17, 2014, 5:46 PM
Russian Hackers Compile List of 10+ Million Stolen Gmail, Yandex, Mailru
September 11, 2014, 11:41 AM
House Minority Leader Pelosi Criticizes FCC's "Fast-Lane" Net Neutrality Plan
September 9, 2014, 4:15 PM
Smarter Than Siri? Cortana Adds Game NFL Game Winner Prediction
September 3, 2014, 4:12 PM
Apple Says Nude Celebrity Photo Dump Wasn’t Result of iCloud, Find My iPhone Breach
September 2, 2014, 3:26 PM
Most Popular Articles
HTC Preps Nexus 9 With Nvidia K1 64-Bit "Denver" SoC, Android L Onboard
September 10, 2014, 10:21 PM
Apple iPhone 6, iPhone 6 Plus Reviews Roll In
September 16, 2014, 9:13 PM
Dell Announces "World's Thinnest" Tablet: The Venue 8 7000 Series
September 11, 2014, 8:51 AM
Samsung Calls Out “Copycat” Apple for 5.5” iPhone 6 Plus in New Ads
September 14, 2014, 11:06 PM
Confirmed: Next Generation of Windows to Be Announced on September 30
September 15, 2014, 4:43 PM
Latest Blog Posts
ISIS Imposes Ban on Teaching Evolution in Iraq
Sep 17, 2014, 5:22 PM
Space Terrorism is a Looming Threat For the United States
Apr 23, 2014, 7:47 PM
Facebook Aims to Provide Internet to "Every Person in the World" with Drones, Satellites
Apr 1, 2014, 10:20 AM
Retail Mobile Sites Experience Outages in Light of Simplexity's Bankruptcy
Mar 14, 2014, 8:48 AM
Tesla vs. BMW: Who Has the Safer EV?
Feb 1, 2014, 2:56 PM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information