中国軍部によるアメリカ合衆国への電脳攻撃
EEUU CIBERATAQUES
La pista de los ciberataques del Ejército chino revelan una compleja batalla
EFE Economía Washington 21 FEB 2013 - 10:01 CET
U.S. cyberattacks
The track Chinese military cyber attacks reveal a complex battle
EFE Economics Washington 21 FEB 2013 - 10:01 CET
The revelation of identities and "modus operandi" of the members of the unit alleged "hacker" most secret Chinese military has been detailed to the extreme and experts believe that China has no intention to hide his role in a global cyberwar much more complex.
"UglyGorilla" their virus signature and uses the same "nickname" on a military web profile "chinamil.com.cn" "DOTA" often creates passwords related to Harry Potter and uses his private phone, and an engineer from Dell has been done with the photos on social networks one of the largest "hacker" Chinese, Zhang Changhe.
The report released this week by the consulting Mandiant and commissioned by The New York Times, after recently suffered attacks from China, reveals some of these details, not seen before.
Mandiant engineers, in a similar way as did those from Symantec, have obtained video of how to operate the alleged members of the military secret "Unit 61398," entrenched in a discreet building in Shanghai.
According to the expert said Tuesday Yael Shahar Israeli cybersecurity to National Journal, the Chinese do not hide their attacks in the cultural importance of "show up". "It is a projection of their power, make no effort to hide," he said.
In an interview with Efe, Mark Risher, co-founder of security company Impermium, said China "is brandishing their swords" to demonstrate their power in the increasingly active 'cyber war "taking place globally.
According to a 2012 report from Symantec and McAfee, the country that malware or virus attacks done in the world is the United States, followed by China and the two superpowers are also those who are at the head of the list of victims.
The Chinese government denies any involvement in attacks that can be redirected anywhere in the world via the Internet, while the U.S. has taken steps to strengthen its industry leading subtly hinting that China agrees violations of its national security and corporate .
According to Jeffrey Carr, founder of Taia Global Cybersecurity and author of "Inside Cyber Warfare", "it is clear that China will create a large number of attacks because there are no laws or a culture of intellectual property protection But the Chinese are not the only ones. "
"The report Mandiant creates a dangerous precedent. Though China is a clear suspect can not be charged without definitive evidence the Chinese People's Army, that makes us run the risk of escalation," said Carr, who remembers that Russia, countries Israel and France are also very active in both industrial and governmental cyber espionage.
"We have more than 30 developed and emerging countries increasing day by day their military units cyber espionage, all major intelligence agencies are involved," said Carr
For ArsTechnica web expert, Dan Goodin, Mandiant report has served to detail how China obtained terabytes of sensitive information from over 140 U.S. organizations in the past seven years.
Goodin believes that China is the main beneficiary in this "cyberwar" as getting "valuable data" of the leading industries in the United States, such as aerospace or pharmaceuticals. "The intangible information is our main raw material," he says.
As a full report detailing the Mandiant, and in 2004 a curious Chinese netizen called "UglyGorilla" Zhang Zhaozhong asked a retired military officer considered one of the masterminds of the "ciberunidades" Chinese attack on their concerns about the future of the country .
In a foreboding tone he asked: "Do you have China as a" cyber army "as the U.S. available?". Everything indicates that it is.
By Jairo Mejia.
0 件のコメント:
コメントを投稿