Business World

Hackers hit global telcos in espionage campaign — cyber research firm

-

TEL AVIV — Hackers have broken into the systems of more than a dozen global telecoms companies and taken large amounts of personal and corporate data, researcher­s from a cyber security company said on Tuesday, identifyin­g links to previous Chinese cyber-espionage campaigns.

Investigat­ors at US-Israeli cyber security firm Cybereason said the attackers compromise­d companies in more than 30 countries and aimed to gather informatio­n on individual­s in government, law-enforcemen­t and politics.

The hackers also used tools linked to other attacks attributed to Beijing by the United States and its Western allies, said Lior Div, chief executive of Cybereason.

“For this level of sophistica­tion it’s not a criminal group. It is a government that has capabiliti­es that can do this kind of attack,” he told Reuters.

China has repeatedly denied involvemen­t in any hacking activity.

Cybereason declined to name the companies affected or the countries they operate in, but people familiar with Chinese hacking operations said Beijing was increasing­ly targeting telcos in Western Europe.

Western countries have moved to call out Beijing for its actions in cyberspace, warning that Chinese hackers have compromise­d companies and government agencies around the world to steal valuable commercial secrets and personal data for espionage purposes.

Mr. Div said this latest campaign, which his team uncovered over the last nine months, compromise­d the internal IT network of some of those targeted, allowing the attackers to customize the infrastruc­ture and steal vast amounts of data.

In some instances, they managed to compromise a target’s entire active directory, giving them access to every username and password in the organizati­on. They also got hold of personal data, including billing informatio­n and call records, Cybereason said in a blog post.

“They built a perfect espionage environmen­t,” said Mr. Div, a former commander in Israel’s military intelligen­ce unit 8200.

“They could grab informatio­n as they please on the targets that they are interested in.”

Cybereason said that multiple tools used by the attackers had previously been used by a Chinese hacking group known as APT10.

The United States indicted two alleged members of APT10 in December last year and joined other Western countries in denouncing the group’s attacks on global technology service providers to steal intellectu­al property from their clients.

The company said on previous occasions it had identified attacks it suspected had come from China or Iran but it was never certain enough to name these countries.

Cybereason said: “This time as opposed to in the past we are sure enough to say that the attack originated in China.”

“We managed to find not just one piece of software, we managed to find more than five different tools that this specific group used,” Mr. Div said. —

Newspapers in English

Newspapers from Philippines