Skip to main content

US security firm says that Single Chinese hacking unit responsible for stealing terabytes of data from hundreds of organizations


If you’re worried that China will grow to one day rule all things and become the world’s biggest and most feared superpower, it probably doesn’t help to know that a computer security firm published a report that states hundreds of terabytes of governmental and industrial data have been stolen by a single Chinese hacker unit.

Computer security firm Mandiant claims that a single hacker unit of the People’s Liberation Army, dubbed Unit 61398, is a prolific hacking force with which to be reckoned, accounting for hundreds of terabytes of stolen data tracing all the way back to 2006. Of course, China’s Defense Ministry denied the reports of a government-backed hacking unit, and said Mandiant’s accusations were unprofessional — not that a government would willingly own up to clandestine security missions that could conceivably start a war with another country of significant power. Mandiant claims it released the report in an effort to “arm and prepare” security experts in the face of the supposed threat.

Mandiant said that Unit 61398 is located in a 12-story building in a financial and banking area of Shanghai, the Pudong district, and is (possibly) composed of thousands of people that can not only speak English, but are knowledgeable in the areas of networking and programming as well. The building reportedly looks fairly normal, sitting in the middle of a residential area, without any visible signs of extra security aside from a sign saying that the area is a restricted military zone. The teams, the report claims, are put together by targeting students who excel at speaking English, and sending them into training programs. This results in hackers who can mimic colloquial English language, passing off as nothing out of the ordinary, then launching attacks on a system’s security.

Perhaps amusingly, a spokesperson for the Chinese Foreign Ministry, Hong Lei, said that China has similar reports suggesting that the United States is responsible for the same crime of hacking and information theft in China. (See: Black hat down: What happened to the world’s most famous hackers?)

When you tell someone that you’re onto a strategy of theirs, that’s usually enough for them to change it, just in case you really do know what they’re up to. You might wonder, then, why Mandiant would divulge information that would cause China to change its supposed strategies. The security firm claims that the scale of the attacks was enough justification to reveal it was aware of China’s reported efforts. Though Mandiant’s report is chock-full of info, it’s not entirely conclusive that the report is accurate — or even true.

Jeffrey Carr, CEO of another computer security firm Taia Global, said that Mandiant’s report has “critical analytic flaws.” Carr claims that though China could be the source of the security breaches, other origins have not yet been explored enough, such as other hacker groups being responsible, but using China as a cover. Even if the origin of the hacks could be traced to a specific cubicle in a Chinese office, that doesn’t mean the Chinese government is responsible, as the hacker could be acting on someone else’s behalf. Carr also states that Mandiant never actually pinned down that specific 12-story building, but rather traced IP addresses to a section of China in which said building is located.

Granted, just because Mandiant’s research may not have explored every angle doesn’t mean China is suddenly free of blame. With the ubiquity of computers and the ever-accelerating bleeding edge of high technology, it’d be a wonder if any government wasn’t involved in some kind of cyber espionage, much less one presiding over a country as large as China. Whatever the case may be, the US government should seek more information before launching any attack that amounts to more than investigative counter intelligence.

Comments

Popular posts from this blog

Navigating the Depths: Understanding, Treating, and Preventing Pulmonary Embolism

Pulmonary embolism (PE) is a critical medical condition that demands a comprehensive exploration of its intricacies. In this blog post, we will delve into the causes, diagnostic procedures, treatment options, and preventative strategies to shed light on this often life-threatening occurrence. Unveiling the Causes of Pulmonary Embolism :  1. Deep Vein Thrombosis (DVT): PE often originates from deep vein thrombosis, where blood clots in the deep veins, typically in the legs, can break loose and travel to the lungs.  2. Surgical Procedures and Trauma: Surgery and traumatic injuries can elevate the risk of clot formation, especially during periods of immobilization in the recovery phase. 3. Lifestyle Factors: Obesity, smoking, and sedentary habits contribute to a pro-thrombotic state, increasing the likelihood of DVT and subsequent PE. 4. Genetic and Hormonal Factors: Inherited conditions affecting blood clotting, hormonal contraceptives, and pregnancy can predispose individuals to pulmona

Embracing the AI Revolution: Redefining Software Development

 In the ever-evolving landscape of technology, a seismic shift is underway—a revolution driven by the fusion of artificial intelligence (AI) and software development. Envisioning this future is not just about imagining possibilities but understanding the profound impact it will have on how we create, innovate, and interact with technology. A Journey Through Programming Languages To appreciate the transformative potential of AI in software development, let's take a moment to reflect on the historical evolution of programming languages—the bedrock upon which modern computing is built. 1. Machine Language : In the early days of computing, programmers communicated with machines through raw binary instructions—machine language. This rudimentary form of programming was laborious and error-prone, requiring an intimate understanding of the computer's architecture. 2. Assembly Language : The introduction of assembly language provided a symbolic representation of machine language instruc

The Human Edge: Navigating Corporate Success in the Era of AI

   In the rapidly evolving landscape of artificial intelligence, a crucial question arises: What distinctive strengths do humans bring to the corporate realm that technology struggles to replicate? This exploration delves deep into the intricacies of human capabilities, unraveling a blueprint for organizations eager to leverage these strengths for sustained corporate success amidst the rise of AI. The Power of Creative Problem-Solving: Nurturing a Culture of Innovation In a world increasingly dominated by algorithms, the human touch remains unparalleled in creative problem-solving. Empowering employee creativity through platforms, cross-functional collaboration, and recognition programs fosters an environment where humans thrive, bringing imaginative solutions rooted in intuition, adaptability, and a depth of experience that AI struggles to match. Emotional Intelligence in Leadership: Building Empathetic and Effective Leaders Leadership extends beyond mere decision-making, encompassing

Nokia X Android smartphone with dual sim to arrive in India on March 10 for Rs 8,500

Nokia’s Android smartphone, the Nokia X will be available in India on 15 March and is priced at Rs 8,500. The smartphone is already listed online on The Mobile Store’s website . Currently the date and the price of the smartphone have been removed from the online site. Nokia had announced three Android smartphones as part of the X series at the Mobile World Congress last month. The devices will be known as the X, X+ and XL and Nokia had said at the time of the launch that the smartphones would be available ‘very soon’ in India. Nokia also said that the Nokia X would start retailing for 89 euros (approx Rs 7,600), the X+ for 99 euros (approx Rs 8,400) and would hit stores in Q2 this year.

Earphones Review: Cowon EM1

Like ballistic weapons and automobiles, the basic working principle in audio equipment has largely been the same for a long time. All improvements over the past few decades have been incremental at best, especially since there hasn't been any fundamental shift in the underlying technology. This means, we are used to having a clear idea of capabilities and limitations of any product within a given price range. Take the low-end IEM segment for example. Although the sub-Rs 1500 range is home to excellent offerings from JVC, SoundMAGIC and Sony, none of these alternatives are without their fair share of niggles. These are niggles that we have grown accustomed to, because what's gained in terms of value in a budget IEM invariably has to be balanced out with a compromise in audio fidelity. This was believed to be the norm—that is, until we got our mitts on Cowon's EM1 in-ear earphones.

Top 3 Budget Smartphones for Sept 2014

Redmi 1S: Xiaomi’s Redmi 1S comes with great expectations and it represents a big moment for the company’s India plans. The super affordable mid-range phone goes on sale tomorrow and is expected to outpace the Mi 3 in terms of selling out on Flipkart. With a price tag of Rs 5,999, it also promises to shake up this market segment which is reserved for the very basic smartphones. The Moto E changed that to a certain extent, but Xiaomi takes it a step beyond. Is it successful?