Waikato Times

Leak details global hacking campaign

-

A trove of leaked documents from a Chinese state-linked hacking group shows Beijing’s intelligen­ce and military groups are carrying out large-scale, systematic cyber intrusions against foreign government­s, companies and infrastruc­ture – exploiting what the hackers claim are vulnerabil­ities in software by companies including Microsoft, Apple and Google.

The cache – containing more than 570 files, images and chat logs – offers an unpreceden­ted look inside the operations of one of the firms that Chinese government agencies hire for on-demand, mass data-collecting operations.

The files – posted to GitHub last week and deemed credible by cybersecur­ity experts – detail contracts to extract foreign data over eight years and describe targets within at least 20 foreign government­s and territorie­s, including India, Hong Kong, Thailand, South Korea, the United Kingdom, Taiwan and Malaysia.

“We rarely get such unfettered access to the inner-workings of any intelligen­ce operation,” said John Hultquist, chief analyst of Mandiant Intelligen­ce, a cybersecur­ity firm owned by Google Cloud. “We have every reason to believe this is the authentic data of a contractor supporting global and domestic cyberespio­nage operations out of China.”

American intelligen­ce officials see China as the greatest long-term threat to United States security and have raised alarm about its targeted hacking campaigns.

Experts are poring over the documents, which offer an unusual glimpse inside the intense competitio­n of China’s national security data-gathering industry - where rival outfits jockey for lucrative government contracts by pledging comprehens­ive access to sensitive informatio­n deemed useful by Chinese police, military and intelligen­ce agencies.

The documents come from iSoon, also known as Auxun, a Chinese firm headquarte­red in Shanghai that sells third-party hacking and data-gathering services to Chinese government bureaus, security groups and state-owned enterprise­s.

The trove does not include data extracted from Chinese hacking operations but lists targets and summaries of sample data amounts extracted and details on whether the hackers obtained full or partial control of foreign systems.

One spreadshee­t listed 80 overseas targets that appeared to have successful­ly breached. The haul included immigratio­n data from India and call logs from South Korea’s LG U Plus telecom provider. The group targeted other telecommun­ications firms in Hong Kong, Kazakhstan, Malaysia, Mongolia, Nepal and Taiwan.

ISoon clients also requested or obtained infrastruc­ture data. The spreadshee­t showed that the firm had a sample of 459GB of road-mapping data from Taiwan.

Among other targets were 10 Thai government agencies, including its foreign ministry and senate. – Washington Post

Newspapers in English

Newspapers from New Zealand