Monday, May 20, 2013

They're back and doing it again


The Chinese hackers that work for the Chinese military. Apparently efforts to get rid of them have failed and they are up to their old tricks again.
The Obama administration had bet that “naming and shaming” the groups, first in industry reports and then in the Pentagon’s own detailed survey of Chinese military capabilities, might prompt China’s new leadership to crack down on the military’s highly organized team of hackers — or at least urge them to become more subtle.

But Unit 61398, whose well-guarded 12-story white headquarters on the edges of Shanghai became the symbol of Chinese cyberpower, is back in business, according to American officials and security companies.

It is not clear precisely who has been affected by the latest attacks. Mandiant, a private security company that helps companies and government agencies defend themselves from hackers, said the attacks had resumed but would not identify the targets, citing agreements with its clients. But it did say the victims were many of the same ones the unit had attacked before.

The hackers were behind scores of thefts of intellectual property and government documents over the past five years, according to a report by Mandiant in February that was confirmed by American officials. They have stolen product blueprints, manufacturing plans, clinical trial results, pricing documents, negotiation strategies and other proprietary information from more than 100 of Mandiant’s clients, predominantly in the United States.

According to security experts, the cyberunit was responsible for a 2009 attack on the Coca-Cola Company that coincided with its failed attempt to acquire the China Huiyuan Juice Group. In 2011, it attacked RSA, a maker of data security products used by American government agencies and defense contractors, and used the information it collected from that attack to break into the computer systems of Lockheed Martin, the aerospace contractor.

More recently, security experts said, the group took aim at companies with access to the nation’s power grid. Last September, it broke into the Canadian arm of Telvent, now Schneider Electric, which keeps detailed blueprints on more than half the oil and gas pipelines in North America.

Representatives of Coca-Cola and Schneider Electric did not return requests for comment on Sunday. A Lockheed Martin spokesman said the company declined to comment.

In interviews, Obama administration officials said they were not surprised by the resumption of the hacking activity. One senior official said Friday that “this is something we are going to have to come back at time and again with the Chinese leadership,” who, he said, “have to be convinced there is a real cost to this kind of activity.”
And so we wait until we can outhack them because there is not much else that will stop them. Or maybe we already can and they have nothing of value to hack? Oh well, at least the Chinese don't much care for our e-mails, unless you are calling Xi Jinping a big fat poopy face.

Comments:
Yah, the Chinese don't have much of value to hack. So we stole the plans of their new third-generation fighter. Big effin' deal. We already pretty much knew what its capabilities must be, given that it's built from Israeli plans for the Lavi fighter jet that we forced the Israelis to not build. If the Chinese knew how to build the F-22 though... now that's a real hack. And yeah, I know the F-22 has a bad habit of suffocating its pilots, but the Chinese are pretty good at taking designs and fixing them -- see their clone of the Soyuz spacecraft, for example, which they've upscaled and modernized to remove some of its main limitations.
 

Post a Comment

Subscribe to Post Comments [Atom]





<< Home

This page is powered by Blogger. Isn't yours?

Subscribe to Posts [Atom]