Report identifies widespread cyber-spying

By , Published: August 2


A leading computer security firm has used logs produced by a single server to trace the hacking of more than 70 corporations and government organizations over many months, and experts familiar with the analysis say the snooping probably originated in China.

Among the targets were the Hong Kong and New York offices of the Associated Press, where unsuspecting reporters working on China issues clicked on infected links in e-mail, the experts said.



Other targets included the networks of the International Olympic Committee, the United Nations secretariat, a U.S. Energy Department lab, and a dozen U.S. defense firms, according to a report to be released Wednesday by McAfee, a security firm that monitors network intrusions around the world.

McAfee said hundreds of other servers have been used by the same adversary, which the company did not identify.

But James A. Lewis, a cybersecurity expert at the Center for Strategic and International Studies, said “the most likely candidate is China.” The target list’s emphasis on Taiwan and on Olympic organizations in the run-up to the Beijing Games in 2008 “points to China” as the perpetrator, he said. “This isn’t the first we’ve seen. This has been going on from China since at least 1998.”

Another computer expert with knowledge of the study, who spoke on the condition of anonymity out of reluctance to blame China publicly, said the intrusions appear to have originated in China.

The intruders were after data on sensitive U.S. military systems, as well as material from satellite communications, electronics, natural gas companies and even bid data from a Florida real estate company, McAfee said. Forty-nine of the 72 compromised organizations were in the United States.

“We’re facing a massive transfer of wealth in the form of intellectual property that is unprecedented in history,” said Dmitri Alperovitch, McAfee’s vice president of threat research. He would not name the private entities targeted, but said McAfee helped half a dozen of them investigate intrusions.

Some of the intrusions — such as one into the World Anti-Doping Agency in Montreal — are continuing, he said. Spokesmen for that organization and for the International Olympic Committee said they were not aware of the intrusions. A U.N. spokesman said technicians analyzing the logs have not seen evidence of stolen data. The Energy Department had no comment.

According to the report, which does not identify the AP by name, the organization’s New York office was targeted in August 2009 in an intrusion that lasted, on and off, for eight months. Its Hong Kong bureau was penetrated at the same time, in an intrusion that continued for 21 months.

AP spokesman Jack Stokes said the company was aware of the report. “We do not comment on network security,” he said.

The Associated Press has been targeted before. A March 2009 report by Canadian researchers about allegations of Chinese espionage against the Tibetan community found that computer systems in AP offices in Hong Kong and Britain had been compromised.

 McAfee had been aware for years of a “command and control” server located in a Western country that was used to control malware deployed on target computers. But the firm just recently discovered that the hackers had made a tradecraft mistake, configuring the server to generate logs that identified every Internet protocol address the server had controlled since 2006.

Google’s disclosure early last year that hackers in China had broken into its networks and stolen valuable source code was a watershed moment: A major U.S. company volunteered that it had been hacked. Google also said that more than 20 other large companies were similarly targeted.

Scott Borg, chief economist at the U.S. Cyber Consequences Unit, a research group, has assessed the annual loss of intellectual property and investment opportunities across all industries at $6 billion to $20 billion, with a big part owing to oil industry losses. These firms spend hundreds of millions of dollars to explore oil fields before bidding on them, Borg said.

One measure of pain came recently when EMC Corp. disclosed that it had taken a $66 million charge to cover remediation costs associated with a March intrusion of its RSA division. That intrusion, which industry experts say appeared to have originated in China, resulted in the compromise of RSA’s SecurID computer tokens that companies and governments worldwide use to log on remotely to workplace systems.

As a result of the compromise, at least a dozen major financial institutions are switching to other vendors, said Gary McGraw, chief technology officer at Cigital, a security firm that works with banks. Stina Ehrensvard, chief executive of YubiKey in Palo Alto, Calif., said at least 25 firms have switched to YubiKey or are testing its token as a result of the RSA breach.

Staff researcher Julie Tate contributed to this report.

http://www.washingtonpost.com/national/national-security/report-ide...

Views: 59

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

tjdavis posted a video

Stink full movie

documentary on dangerous chemical ingredients found in everyday products
1 hour ago
David Simmons is now a member of 12160 Social Network
4 hours ago
tjdavis posted a video

Revolution (1968) scenes featuring Today Louise Malone

Some clips from Jack O'Connell's Revolution (1968), featuring the one and only Today Louise Malone.
yesterday
cheeki kea replied to cheeki kea's discussion Tartaria
"This screenshot is from a book found by a blogger in his research and gives an eye witnessed…"
Thursday
cheeki kea commented on Doc Vega's blog post To Each and every One of you here Happy Thanksgiving
Thursday
Doc Vega posted blog posts
Wednesday
Doc Vega commented on tjdavis's video
Thumbnail

The Hunt - Official Trailer [HD]

"A former ANTIFA member was interviewed here recently and this would not be far from actual reality…"
Monday
Doc Vega posted blog posts
Monday
tjdavis posted videos
Monday
tjdavis posted a blog post
Monday
tjdavis posted a photo
Monday
Doc Vega posted a blog post

Legacy of Supposedly Inferior Aircraft Outmatching Their Enemies

 We think of the Korean War aerial combat as the classic dogfights between the American F-86 Sabre…See More
Nov 22
Doc Vega commented on tjdavis's blog post Cities,States Without Limits
"This is just another form of a feudal globalism dictated by corporate technocrats bragging about…"
Nov 22
Doc Vega favorited tjdavis's blog post Cities,States Without Limits
Nov 22
Doc Vega posted a blog post

What is Area 2 and What Goes on There?

 We have all heard of Area 51 and S-4, along with such terms as Water Town, Papoose Lake,…See More
Nov 21
Doc Vega posted a blog post

STRANGE THINGS HAPPENING IN YELLOWSTONE

It’s not the fact that Yellowstone National Park sits atop a super volcano that hasn’t erupted in…See More
Nov 20
tjdavis posted a video

Austrian police raid house of man who leaked Israeli ambassador video making genocidal comments

In a new ITV documentary, Breaking Ranks: Inside Israel’s War, former Israeli soldiers describe how Gaza civilians were killed, often without warning, in an ...
Nov 20
Burbia posted a video

WARHAMMER 40,000 | 1980's GRIMDARK MOVIE

WARHAMMER 40,000 | 1980's GRIMDARK MOVIEThis is a Concept Movie Trailer made with the help of AI. This video is created purely for fun and out of curiosity a...
Nov 19
tjdavis favorited Sandy's discussion Sick sci-fi sex fantasy written by Epstein's first benefactor people say inspired his twisted island... before author's SON ended up arresting him
Nov 19
tjdavis favorited Sandy's discussion Sick sci-fi sex fantasy written by Epstein's first benefactor people say inspired his twisted island... before author's SON ended up arresting him
Nov 19

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted