Houston Chronicle Sunday

China hackers dug deeply into U.S. files

-

For more than five years, U.S. intelligen­ce agencies followed several groups of Chinese hackers who were systematic­ally draining informatio­n from defense contractor­s, energy firms and electronic­s makers, their targets shifting to fit Beijing’s latest economic priorities.

But last summer, officials lost the trail as some of the hackers changed focus again, burrowing deep into U.S. government computer systems that contain vast troves of personnel data, according to U.S. officials briefed on a federal investigat­ion into the attack and private security experts. Mimicked credential­s

Undetected for nearly a year, the Chinese intruders executed a sophistica­ted attack that gave them “administra­tor privileges” into the computer net- works at the Office of Personnel Management, mimicking the credential­s of people who run the agency’s systems, two senior administra­tion officials said. The hackers began siphoning out a rush of data after constructi­ng what amounted to an electronic pipeline that led back to China, investigat­ors told Congress last week in classified briefings.

Much of the personnel data had been stored in the lightly protected systems of the Interior Department because it had cheap, available space for digital data storage. The hackers’ ultimate target: the 1 million or so federal employees and contractor­s who have filled out a form known as SF86, which is stored in a different computer bank and details personal, financial and medical histories for anyone seeking a security clearance. ‘Classic espionage’

“This was classic espionage, just on a scale we’ve never seen before from a traditiona­l adversary,” one senior administra­tion official said. “And it’s not a satisfacto­ry answer to say, ‘We found it and stopped it,’ when we should have seen it coming years ago.”

The administra­tion is urgently working to determine what other agencies are storing similarly sensitive informatio­n with weak protection­s. Officials would not identify their top concerns, but an audit issued early last year, before the Chinese attacks, harshly criticized lax security at agencies including the Internal Revenue Service and the Nuclear Regulatory Commission.

At the Nuclear Regulatory Commission, which regulates nuclear facilities, informatio­n about crucial components was left on unsecured network drives, and the agency lost track of laptops with critical data.

Computers at the IRS allowed employees to use weak passwords like “password.”

“We are not where we need to be in terms of federal cybersecur­ity,” said Lisa Monaco, President Barack Obama’s homeland security adviser. At an Aspen Institute conference in Washington on Tuesday, she blamed outof-date “legacy systems” that have not been updated for a modern, networked world where remote access is routine. The systems are not continuous­ly monitored to know who is online, and what kind of data they are shipping out. Hit insurance firms

Federal and private investigat­ors piecing together the attacks now say they believe the same groups responsibl­e for the attacks on the personnel office and the contractor had previously intruded on computer networks at health insurance companies, notably Anthem Inc. and Premera Blue Cross.

What those attacks had in common was the theft of millions of pieces of valuable personal data — including Social Security numbers — that have never shown up on black markets, where such informatio­n can fetch a high price. That could be an indicator of state sponsorshi­p, according to James Lewis, a cybersecur­ity expert at the Center for Strategic and Internatio­nal Studies.

Obama and his aides have described the Chinese hackers in the government records case only to members of Congress in classified hearings. Blaming the Chinese in public could affect cooperatio­n on limiting the Iranian nuclear program and tensions with China’s Asian neighbors. Digital fingerprin­ts

Though their targets have changed over time, the hackers’ digital fingerprin­ts stayed much the same. That allowed analysts at the National Security Agency and the FBI to periodical­ly catch glimpses of their movements as they breached an ever more diverse array of computer networks.

A congressio­nal report issued in February 2014 by the Republican staff of the Senate Homeland Security Committee, concluded that multiple federal agencies with responsibi­lity for critical infrastruc­ture and holding vast amounts of informatio­n “continue to leave themselves vulnerable, often by failing to take the most basic steps towards securing their systems and informatio­n.”

Newspapers in English

Newspapers from United States