中国の電脳攻撃は進歩
Avanzadilla china en la ciberguerra
‘Hackers’ asiáticos piratean tecnología a empresas extranjeras
Estados Unidos y China, ante la primera ciberguerra fría
Medios de EE UU dicen haber sido atacados por piratas informáticos chinos
Heriberto Araújo / Juan Pablo Cardenal 23 FEB 2013 - 16:46 CET
Chinese outpost cyberwar
Hackers pirate Asian technology to foreign companies
United States and China, at the first Cyber Cold War
U.S. media say they were attacked by Chinese hackers
Heriberto Araújo / Juan Pablo Cardenal 23 FEB 2013 - 16:46 CET
Sheng Xue left his native Beijing shortly after the slaughter in Tiananmen Square. And never returned. At home on the outskirts of Toronto, the benchmark figure of Chinese democracy movement abroad serves tea and invites them to a cabin filled with books and pictures, from which transmits its daily news for Radio Free Asia. Take a seat and press the computer that lights up the screen, revealing the evidence that has been attacked by Chinese hackers.
"I get emails like these practically every day," he says. Refers to dozens of emails in Mandarin, which attached malicious files, sent by target "known", whose identity has been supplanted in order to try to trick her into opening the file and infected. An antivirus company to which El Pais such emails sent for analysis confirmed the diagnosis: the virus contained in the attached documents contains traces and evidence pointing directly to China. Like many other members of Chinese dissidents, Sheng Xue is victim of cyber attacks daily seeking to take control of your computer.
Scenes like this are repeated daily in places as disparate as the seat of the Tibetan government in exile in Dharamsala, the central editorial of newspapers like The New York Times or The Wall Street Journal, and the headquarters of major technology companies, energy or aeronautical planet. All have in common the same assailant, China, whose involvement in new cyber-anything cold, it has broken, has been revealed by the publication of several reports that for the first time, show that Beijing is behind an organized campaign with political and economic strategic objectives.
The revelations of The New York Times on the attacks received by the newspaper to be released an investigative report about the secret fortune billionaire prime minister, Wen Jiabao, the friendly face of the dictatorship, show that China has expanded the focus of political attacks on the network. They are not only dissidents as Sheng Xue or related diaspora spiritual group Falun Gong, Tibetan Buddhism or Uighur movement. The battle is now global. Anyone who threatens or is perceived as an enemy by the Communist regime is susceptible to attack.
But the great concern in major offensives governments are not of this kind. It is the economic nature of Chinese activities. "This is the largest transfer of wealth in the shortest period of history" summarizes in Washington Scott Borg, American expert on the subject who, in collaboration with the business world and the secret services, works to quantify the cost of theft intellectual property in the United States. This economic evaluation is always controversial, precisely because it is hard to assess, but few doubt that the leak of knowledge may undermine decisive competitive advantage in the West.
"Some people pointing the figure of several hundred billion dollars a year. It may be exaggerated. But in any case there is no doubt that they are at least tens of billions a year, "said James Lewis, an expert at the Center for Strategic and International Studies (CSIS) who worked in the Departments of State and Commerce. The Internet security companies, in fact, spent years documenting what sectors are attacked from China: oil, technology, aviation, food, mining, petrochemical, nanotechnology and renewable energy, among others. That is, almost all strategic sectors in the Twelfth Five Year Plan (2011-2015) of China, which lays the foundation for carrying Chinese SOEs to compete globally with western multinationals. The Asian giant has the market, manufacturing and capital, but lacks technology and knowledge.
Nobody had made public a report as explicit as that has distributed this week the company Mandiant, security specialist based in Washington that directly accuses a group of hackers (61389 Unit, comprised of hundreds or even thousands of people) to be directly linked to Chinese Army captain and many of the attacks to penetrate corporate networks as Dow Chemical, Symantec, Adobe, Yahoo, Lockheed Martin, Google, Mitsubishi or Northrop Grumman. As a significant development in the list include U.S. government institutions and state service providers as sensitive as control of oil and electricity companies. Richard Bejtlich, chief security Mandiant said to have "identified 20 Chinese hacking groups clearly defined."
Once again, China has consistently denied everything, but the scope of the investigation, which Mandiant has spent almost eight years, during which he documented more than 140 attacks to be able to identify even the address where the unit works 61389 - one monolithic gray building on the outskirts of Shanghai, leave little room for doubt. "O come 61398 Unit or people who manage networks controlled and monitored over the world are not aware that there are thousands of people generating attacks from that neighborhood," explained Kevin Mandua wryly, founder and CEO of Mandiant in a recent interview.
In fact, other reports of this type made in recent years (Aurora, Shady Rat, Nine Dragons, Titan Rain) by other security corporations confirm the trend: China has launched a bare-chested battle to gain valuable information which is key to the future of its economy. His strategy combines R & D or acquisitions of technologically leading Western companies that have made Chinese capital shot through the current crisis, with industrial cyber espionage practices traditional espionage for intellectual property that will lay the foundation of a modern economy. The piece of the puzzle that is missing to become a true global potential.
And that strategy is carried out in broad daylight, according to Scott Borg. "The Chinese are hacking with such arrogance that virtually no hiding," he says. In Washington, in the middle of the feeling of helplessness in certain areas of business and government at the magnitude of the problem, the speech becomes sometimes Manichean: "China has become a global kleptocracy," said the former adviser eg in cyber espionage George W. Bush. interviews conducted in Russia, Canada and several European countries agree uncover the China challenge. "All countries spy on each other. But the magnitude of China and its economic goals do different country," concludes Dave Clemente, a researcher on the subject of the British think tank Chatham House.
The debate is now to devise a plan to put a stop to this trend. Studying an aggressive U.S. legislation that could include cyber attacks in the list of actions considered as an act of war, perhaps with an eye to their critical infrastructure for national security. Europe, meanwhile, last a common strategy by the European Commission to protect, while Germany and France raised-in line-pass legislation requiring companies to inform attacked the authorities. However, in the field few doubt that Beijing will maintain the status quo-in which the attacks go unpunished by the difficulty of attribution, and the lack of legal framework punitive-much as you can. For the moment, China is winning the battle.
Heriberto Araújo and Juan Pablo Cardenal are authors of The Silent Chinese Conquest (Review).
0 件のコメント:
コメントを投稿