- No mas: Principal bans Spanish language in intercom announcement
- Hacking software could put ‘zombie drone army’ in user’s hands
- Support for stricter gun laws drops: poll
- 10 whales dead, 41 others stranded in Everglades
- John Boehner faces bipartisan pressure to allow gay-rights vote
- Martin Bashir resigns from MSNBC over ‘ill-judged’ comments about Sarah Palin
- Rep. Duncan Hunter: While Obama prays for Iranian change, U.S. should ready its nukes
- Best company ever? Veteran Beer Co. exists to employ vets, provide quality beer
- Iran official: Sanctions ‘utterly failed’ to stop nuclear program
- ‘Black Santa’ display at IU sparks student outrage
Commercial cyberspying offers rich payoff
BEIJING (AP) - For state-backed cyberspies such as a Chinese military unit implicated by a U.S. security firm in a computer crime wave, hacking foreign companies can produce high-value secrets ranging from details on oil fields to advanced manufacturing technology.
This week’s report by Mandiant Inc. adds to mounting suspicion that Chinese military experts are helping state industry by stealing secrets from Western companies possibly worth hundreds of millions of dollars. The Chinese military has denied involvement in the attacks.
“This is really the new era of cybercrime,” said Graham Cluley, a British security expert. “We’ve moved from kids in their bedroom and financially motivated crime to state-sponsored cybercrime, which is interested in stealing secrets and getting military or commercial advantage.”
Instead of credit card numbers and other consumer data sought by crime gangs, security experts say cyberspies with resources that suggest they work for governments aim at better-guarded but more valuable information.
Companies in fields from petrochemicals to software can cut costs by receiving stolen secrets. An energy company bidding for access to an oil field abroad can save money if spies can tell it what foreign rivals might pay. Suppliers can press customers to pay more if they know details of their finances. For China, advanced technology and other information from the West could help speed the rise of giant state-owned companies seen as national champions.
“It’s like an ongoing war,” said Ryusuke Masuoka, a cybersecurity expert at Tokyo's Center for International Public Policy Studies, a private think tank. “It is going to spread and get deeper and deeper.”
Attackers stole information about pricing, contract negotiations, manufacturing, product testing and corporate acquisitions, the company said. It said multiple details indicated the attackers, dubbed APT1 in its report, were from a military unit in Shanghai, though there was a small chance others might be responsible.
Target companies were in four of the seven strategic industries identified in the Communist Party’s latest five-year development plan, it said.
China’s military is a leader in cyberwarfare research, along with its counterparts in the United States and Russia. The People’s Liberation Army supports hacker hobby clubs with as many as 100,000 members to develop a pool of possible recruits, according to security consultants.
Mandiant said it traced attacks to a neighborhood in Shanghai’s Pudong district where the PLA’s Unit 61398 is housed in a 12-story building. The unit has advertised online for recruits with computer skills. Mandiant estimated its personnel at anywhere from hundreds to several thousand.
On Wednesday, the PLA rejected Mandiant’s findings and said computer addresses linked to the attacks could have been hijacked by attackers elsewhere. A military statement complained that “one-sided attacks in the media” destroy the atmosphere for cooperation in fighting online crime.
Many experts are not swayed by the denials.
“There are a lot of hackers that are sponsored by the Chinese government who conduct cyberattacks,” said Lim Jong-in, dean of Korea University’s Graduate School of Information Security.
- Hola: Boehner prepares to push amnesty bill through House
- Inside China: Nuclear submarines capable of widespread attack on U.S.
- Apple wins facial recognition patent for iPhone 6
- Kill team: Obama war chiefs widen drone death zones
- U.S. drops 2,000 mice on Guam by parachute to kill snakes
- Inside the Ring: China targeting U.S. spy flights
- Obamas call to close Vatican embassy is 'slap in the face' to Roman Catholics
- HURT: Postal Service misses address by a whole continent
- Puerto Rico caravan honoring Paul Walker ends in 6 drunken-driving arrests, 72 speeding tickets
- Pentagon may give recruits 'a shot to start over' after shameful social media posts
Independent voices from the The Washington Times Communities
A libertarian look at breaking news and political trends by author Tom Mullen.
A stat-head’s outlook, direct from his worn in couch cushion.
Playing Through covers the world of PGA golf, as well as tips your the average golfer to play better.