Global Times

The art of cyber war

▶ Top engineer discloses how China deals with foreign intelligen­ce-backed cyber attacks

-

Editor’s Note:

In recent years, without factul basis, some Western countries accused Chinese individual­s or groups of conducting cyber attacks in an attempt to steal commercial and military secrets from other countries.

The most recent examples the Mar500 riott data breach that affected million guests’ informatio­n. In a recent article, Reuters cited unnamed sources as saying that China is the lead suspect in the case.

In reality, China has always been a victim of cyber attacks. The Global Times

(GT) reporter Guo Yuandan interviewe­d Xiao Xinguang (Xiao), the chef technical architect of Beijing-based Anty Labs, on the cyber threats China has been facing in us solutions recent years.

Antiy Labs provides antivirus solutions to clients with high security needs such as China’s cyberspace affairs authoritie­s, the military, State secrets protection depart-authoritie­s. ments and other government authoritie­s.

Foreign intelligen­ce ba

GT: Since the beginning of the 21st Century, the developmen­t of networkn based applicatio­ns has been in full swing. What are the characteri­stics of cyber attacks that pose a security risk to China in different phase?

Xiao: From 2000 to 2005 worms and Distribute­d Denial of Service (DDoS) attacks, which has a major impact on the internet experience, attracted the most attention. After 2005, as the internet had deeper ties with users’ property ad privacy, profit-driven cyber attacks such as Trojan attacks grew explosivel­y.

With the rapid developmen­t of informatio­n technology, the value of informatio­n assets changed dramatical­ly. Informatio­n system whether or not they are connected on the internet, became pivotal national security, people’s livelihood and social operation.

The main consequenc­es of cyber threats are no longer the impact on public internet efficiency online experience, but impacts o fields including politics, the economy, the military, science, technology and the environmen­t. Most of the attacks are from advanced cyber treat actors. tors.

“According to public informatio­n, since at least 2000, the Equation Group, a hacking group under the US National Security Agency, has invaded important targets of the global internet. Due to its high level of stealth, its threat was revealed only gradually.” Xiao Xinguang

chief technical architect of Beijing-based Antiy Labs

is not to say that advanced cyber threat actors have only appeared in recent years. According to public informatio­n, since at least 2000, the Equation Group, a hacking group under the US National Security Agency, has invaded important targets of the global internet. Due to its high level of stealth, its threat was revealed only gradually.

GT: Which areas of China are most subject to cyber attacks?

Xiao: China has encountere­d advanced cyber threats mainly focusing on high-value targets in the political, economic, military and scientific fields. For example, the threat actor DroppingEl­ephant mainly targets the Chinese government, the military, industries, colleges and universiti­es. GreenSpot is mainly aimed at the government, aviation, military, scientific research and other targets.

OceanLotus carries out intrusions into Chinese maritime institutio­ns, research institutes and shipping companies.

Rather than making intensive attacks, their behavior is often small, hidden and hard to detect.

GT: Can you give an example of how advanced cyber threat actors conduct cyber attacks?

Xiao: Take DroppingEl­ephant as an example. The hacker group sends an email to our scientific research staff disguised as news containing a malicious link. After clicking it, it will download Office files containing exploit codes, which will release the Trojans and control the computer.

Email servers and even network firewalls and other security devices are all preferred targets for advanced cyber threat actors. For example, the NSA once attacked the largest financial service institutio­n in the Middle East by controllin­g two layers of firewalls through undisclose­d vulnerabil­ities and penetratin­g into the intranet.

In some cases, the hacker group will bring the Trojan and weapons to its target by hijacking computer appliances being delivered to the target, buying off employees working at the target institutio­n, or sending an agent to go undercover in the target institutio­n.

Once the attacker enters the intranet, it will “laterally move” through the vulnerabil­ity, and the Trojan will be launched to gain control of more nodes to access higher value nodes and obtain high-value sensitive informatio­n. At the same time, the attacker will also persist in the attacked network by hiding in the system firmware.

GT: Are the highly organized and profession­al overseas hacker organizati­ons such as OceanLotus increasing the number of attacks on China?

Xiao: With rising big-power and geopolitic­al competitio­n, China is bound to face an increasing­ly stern cyber security challenge. The advanced cyber threat actors we face often have a foreign intelligen­ce agency background. They have a firm will to attack and can withstand the high cost of the attacks. With the support of an advanced engineerin­g team, a high-level team of personnel selects the appropriat­e equipment from the attack arsenal for a combined attack.

Detect, analyze and trace

GT: Using DroppingEl­ephant as an example, could you explain how an Advanced Persistent Attack (APT) is detected, analyzed and traced?

Xiao: First of all, it relies on the situationa­l awareness platforms and advanced threat protection products deployed on the user side to help users detect attacks and intercept them. At the same time, Antiy deployed a large number of monitoring sessions to conduct active threat capture and automated analysis, and to share threat informatio­n with companies and organizati­ons in the industry. The Antiy analysis team combined public informatio­n with its analysis results to profile the DroppingEl­ephant hacker group and pinpointed a natural person.

GT: Maintainin­g cyber security is like doctors treating people and saving lives. Can the developmen­t of medical skills keep up with the growth of diseases?

Xiao: The essence of cyber security is confrontat­ion. The essence of confrontat­ion is the ability of both sides to attack and defend. This confrontat­ion is long-term and dynamic, and whoever takes the initiative in a confrontat­ion depends on many factors.

In various confrontat­ions, the attacker has a certain initiative, but the defender can also deal with systematic attacks with a systematic defense. They can minimize the area of the attack, drain the attacker’s resources, and weaken and block the attack.

The enemy has penetrated us

GT: Cyber security has become a normal point of conflict in big-power and geopolitic­al confrontat­ion. What is China’s weakness in cyber security? Xiao: According to what we have seen, the lack of situationa­l awareness and lack of defense of important informatio­n systems and key informatio­n infrastruc­ture is a very urgent problem we are facing now. We are vulnerable to low-level attacks such as ransomware, to say nothing of attacks by advanced cyber threat actors. Cyber defense capabiliti­es have become a key capability for big countries.

We must comprehens­ively improve the security and defense capability of China’s informatio­n infrastruc­ture. In every important informatio­n system and key informatio­n infrastruc­ture, we need to achieve all-day all-round awareness and effective defense.

To master network security defense, we need to objectivel­y assess what the enemy is like. This is a comprehens­ive analysis of the intentions, systems, capabiliti­es, resources, and plans of the cyber threat actors. For scenarios with a high informatio­n value, high defense level, and high threat, it is unrealisti­c to physically isolate the enemy.

We must carry out the mentality, “The enemy has penetrated us, and the enemy will penetrate us.”

GT: What is your assessment of the capability of the US in cyber attacks and defense? Is the gap between China and the US large? Is internatio­nal cooperatio­n required in the field of cyber security?

Xiao: The US has the largest engineerin­g system in the world that supports signal intelligen­ce and cyber attack operations. It has the largest and most complex organizati­ons and personnel. It also has the world’s largest cyberspace attack arsenal, including advanced malicious code covering all system platforms, a large number of exploit tools, attack platforms and devices for undisclose­d vulnerabil­ities.

The US has not only built a large number of intelligen­ce and attack operations engineerin­g systems, but also spared no effort to carry out various battlefiel­d prediction­s. From the perspectiv­e of defense capability, the US gradually moved from a threatorie­nted constructi­on model to a capacity-oriented constructi­on model at the beginning of this century, and carried out systematic and comprehens­ive security investment. In terms of network security planning, constructi­on and operation, the US has accumulate­d a large number of methods, frameworks, standards, etc, and has a lot of successful practical experience.

Dealing with advanced cyber threat actors is a very serious challenge for China’s important informatio­n systems and key informatio­n infrastruc­ture. This requires solid constructi­on and investment. It can be said that the level of defense of important informatio­n systems and critical infrastruc­ture will determine how much initiative China has at critical moments.

Although each country has different national situations and different interests, they also face common threats and challenges. For example, in response to major network virus outbreaks and serious loopholes that threaten critical informatio­n infrastruc­ture, they need correspond­ing emergency mechanisms to maintain cyberspace security together.

 ??  ??
 ?? Photos: VCG ?? A visitor takes photos of a screen monitoring the internet during an exhibition on cyber security in Shanghai in September 2017. In the box: Xiao Xinguang, chief technical architect of Beijingbas­ed Antiy Lab, speaks at an event on promoting cyber security in Chengdu, Southwest China’s Sichuan Province in September.
Photos: VCG A visitor takes photos of a screen monitoring the internet during an exhibition on cyber security in Shanghai in September 2017. In the box: Xiao Xinguang, chief technical architect of Beijingbas­ed Antiy Lab, speaks at an event on promoting cyber security in Chengdu, Southwest China’s Sichuan Province in September.

Newspapers in English

Newspapers from China