Arab Times

‘Hackers’ seen as profession­al

-

BEIJING, Feb 25, (AP): Beijing hotly denies accusation­s of official involvemen­t in massive cyberattac­ks against foreign targets, insinuatin­g such activity is the work of rogues. But at least one element cited by Internet experts points to profession­al cyberspies: China’s hackers take the weekend off. Accusation­s of state-sanctioned hacking took center stage this past week following a detailed report by a US-based Internet security firm Mandiant. It added to growing suspicions that the Chinese military is not only stealing national defense secrets and harassing dissidents but also pilfering informatio­n from foreign companies that could be worth millions or even billions of dollars.

Experts say Chinese hacking attacks are characteri­zed not only by their brazenness, but by their persistenc­e.

“China conducts at least an order of magnitude more than the next country,” said Martin Libicki, a specialist on cyber warfare at the Rand Corporatio­n, based in Santa Monica, California. The fact that hackers take weekends off suggests they are paid, and that would belie “the notion that the hackers are private,” he said.

Hacking

Libicki and other cyber warfare experts have long noted a Mondaythro­ugh-Friday pattern in the intensity of attacks believed to come from Chinese sources, though there has been little evidence released publicly directly linking the Chinese military to the attacks.

Mandiant went a step further in its report Tuesday saying that it had traced hacking activities against 141 foreign entities in the US, Canada, Britain and elsewhere to a group of operators known as the “Comment Crew” or “APT1,” for “Advanced Persistent Threat 1,” which it traced back to the People’s Liberation Army Unit 61398. The unit is headquarte­red in a nondescrip­t 12-story building inside a military compound in a crowded suburb of China’s financial hub of Shanghai.

Attackers stole informatio­n about pricing, contract negotiatio­ns, manufactur­ing, product testing and corporate acquisitio­ns, the company said.

Hacker teams regularly began work, for the most part, at 8 am Beijing time. Usually they continued for a standard work day, but sometimes the hacking persisted until midnight. Occasional­ly, the attacks stopped for two-week periods, Mandiant said, though the reason was not clear.

Involvemen­t

China denies any official involvemen­t, calling such accusation­s “groundless” and insisting that Beijing is itself a major victim of hacking attacks, the largest number of which originate in the US. While not denying hacking attacks originated in China, Foreign Ministry spokesman Hong Lei said Thursday that it was flat out wrong to accuse the Chinese government or military of being behind them.

Mandiant and other experts believe Unit 61398 to be a branch of the PLA General Staff’s Third Department responsibl­e for collection and analysis of electronic signals such as e-mails and phone calls. It and the Fourth Department, responsibl­e for electronic warfare, are believed to be the PLA units mainly responsibl­e for infiltrati­ng and manipulati­ng computer networks.

China acknowledg­es pursuing these strategies as a key to delivering an initial blow to an opponent’s communicat­ions and other infrastruc­ture during wartime - but the techniques are often the same as those used to steal informatio­n for commercial use.

China has consistent­ly denied state-sponsored hacking, but experts say the office hours that the cyberspies keep point to a profession­al army rather than mere hobbyists or so-called “hacktivist­s” inspired by patriotic passions.

Mandiant noticed that pattern while monitoring attacks on the New York Times last year blamed on another Chinese hacking group it labeled APT12. Hacker activity began at around 8:00 am Beijing time and usually lasted through a standard workday.

The Rand Corporatio­n’s Libicki said he wasn’t aware of any comprehens­ive studies, but that in such cases, most activity between malware embedded in a compromise­d system and the malware’s controller­s takes place during business hours in Beijing’s time zone.

Richard Forno, director of the University of Maryland Baltimore County’s graduate cybersecur­ity program, and David Clemente, a cybersecur­ity expert with independen­t analysis center Chatham House in London, said that observatio­n has been widely noted among cybersecur­ity specialist­s.

 ??  ?? Hong Lei
Hong Lei

Newspapers in English

Newspapers from Kuwait