just like the trade war between u.s and Japan in 1980s.

SAN
 FRANCISCO — The email attachment looked like a brochure for a yoga 
studio in Toulouse, France, the center of the European aerospace 
industry. But once it was opened, it allowed hackers to sidestep their 
victim’s network security and steal closely guarded satellite 
technology.
The
 fake yoga brochure was one of many clever come-ons used by a stealth 
Chinese military unit for hacking, said researchers at CrowdStrike, an 
Irvine, Calif., security company. Their targets were the networks of 
European, American and Japanese government entities, military 
contractors and research companies in the space and satellite industry, 
systematically broken into for seven years.
Just weeks after the Justice Department indicted five members of the Chinese army, accusing them of online attacks on United States corporations, a new report
 from CrowdStrike, released on Monday, offers more evidence of the 
breadth and ambition of China’s campaign to steal trade and military 
secrets from foreign victims.
The
 report, parts of which The New York Times was able to corroborate 
independently, ties attacks against dozens of public and private sector 
organizations back to a group of Shanghai-based hackers whom CrowdStrike
 called Putter Panda because they often targeted golf-playing conference
 attendees. The National Security Agency and its partners have 
identified the hackers as Unit 61486, according to interviews with a 
half-dozen current and former American officials.

Those officials say the N.S.A. and its partners are currently tracking more than 20 hacking groups in China,
 over half of them units of the People’s Liberation Army, as they break 
into public and private sector companies ranging from satellite, drone 
and nuclear weapon component makers to technology and energy companies 
and research groups.
Unit 61486, researchers say, in some instances shared computing resources and communicated with members of Unit 61398, the P.L.A. unit whose members were the focus of last month’s indictments.
“If
 you look at all the groups that we track in China, the indictments are 
just the very tip of the iceberg,” said George Kurtz, a co-founder of 
CrowdStrike.
Knowledge
 of the attacks, which continue even now and are being reported for the 
first time, emerge amid an escalating conflict between the United States
 and China over online espionage.
Tensions
 had been simmering for years, but grew more pointed last year when an 
American cybersecurity company, Mandiant, identified Unit 61398 as the 
source of thousands of attacks on foreign companies. The Justice 
Department’s indictment last month named five members of that group and,
 for the first time, named some of its victims, which included Alcoa, 
Westinghouse Electric and the United States Steel Corporation.
In response, Chinese officials have denounced the indictments, denied the charges, cited recent revelations that the United States has engaged in its own cyberespionage, and announced retaliatory measures, including new inspection procedures for American technologies, all raising the prospect of a trade war.
The
 decision to issue indictments against the members of Unit 61398 has 
proved controversial, even inside the Obama administration. The members 
of the unit are almost certain never to see the inside of an American 
courtroom, and American officials fear that it could become more 
difficult to negotiate norms of behavior with China.
The
 same issue will arise in the case of this newly disclosed unit, whose 
operations pose as large a threat to American infrastructure as the one 
whose members have been indicted.
CrowdStrike’s
 forensic investigation revealed that members of Unit 61486 took steps 
to hide their origins — by using compromised foreign websites to launch 
their attacks, for instance — but left behind digital traces of their 
identities and whereabouts. The report does not name the companies that 
were targeted because of confidentiality agreements CrowdStrike has with
 clients.
The
 hackers’ tools were developed during working hours in Chinese time 
zones, researchers say, and Internet records show that in one case 
hackers used the same I.P. address as members of Unit 61398 to launch 
their attacks. The use of that address for simultaneous attacks suggests
 cooperation between Unit 61398 and Unit 61486, said Adam Meyers, 
CrowdStrike’s head of threat intelligence.
CrowdStrike,
 founded by two former executives of the security software company 
McAfee, is one of a new generation of computer security companies that 
specialize in so-called computer forensics.
Rather
 than reacting to attacks by hackers, the company tries to understand 
who hackers are and what methods they are using. It has released several
 reports on global hacking over the last year.
The
 firm’s investigation revealed that the group targeted its victims with 
custom malware disguised as emails containing PDF invitations to 
aerospace and satellite conferences, job postings and, in one case, the 
brochure for a yoga studio in Toulouse.
Once
 victims clicked on decoy files, they inadvertently downloaded malicious
 programs onto their computers. That opened the door for attackers to 
enter the victim’s network, see which other devices and networks their 
victim was connected to, and eventually steal trade secrets and design 
schematics for satellite and aerospace technology.
CrowdStrike’s
 researchers said they traced attacks on dozens of the company’s clients
 in the space and satellite industry to the group; the researchers say 
the list of victims could number in the hundreds, if not thousands.
In
 some cases, researchers said, attackers slipped up and registered 
websites used in their assaults under the same email address they used 
to register personal blog and social media accounts. In one case, an 
attacker deployed a remote access tool, or RAT, from a web domain 
registered to an email address that belonged to a onetime student at the
 School of Information Security Engineering at Shanghai Jiao Tong 
University, a top university long suspected of being a state recruiting ground for hackers.
Representatives for Shanghai Jiaotong did not respond to fax messages requesting comment.
In
 another case, an email address — which popped up repeatedly in Internet
 records for attack domains — was used to register a personal blog on 
Sina.com, the Chinese Internet portal, to a 35-year-old who listed the 
military as his profession. The soldier did not return requests for 
comment, but in security discussion forums, CrowdStrike’s researchers 
uncovered discussions between that person and two other hackers, whose 
noms de guerre, ClassicWind and Linxder, have been linked to members of 
Unit 61398.
The
 35-year-old’s Picasa albums show photos of him in military training and
 celebrating his birthday with friends in military garb, and pictures of
 his dormitory, where P.L.A. officer hats are conspicuously in the 
background. And in his album labeled “office,” photos show a tall white 
building in Shanghai, surrounded by satellite dishes and dormitory-style
 residences. Researchers at CrowdStrike believe it is the headquarters 
for Unit 61486.
Visited
 by The New York Times, the P.L.A. headquarters — just north of downtown
 Shanghai in the Zhabei district — were clearly marked as a “military 
zone.” Soldiers guard the entrance to the building, which is surrounded 
by tall walls topped with wire fencing, a moat and trees that camouflage
 military satellite dishes. Viewed from nearby landmarks, the building 
is full of military personnel and patriotic military slogans.
Military analysts at the Project 2049 Institute,
 a defense research group in Arlington, Va., suspected that Unit 61486 
supported China’s space surveillance network and maintained close ties 
with the Beijing Remote Sensing Research Institute, a state-sponsored 
organization whose mission is to explore “leading technologies in earth 
observation and the mechanisms for acquiring and distributing remote 
sensing information,” according to its website. The analysts never 
presented any evidence.
CrowdStrike
 believes its report offers the final proof. “We’ve got the gun, the 
bullet and the body,” Mr. Meyers said of evidence connecting attacks on 
its clients, in the space and satellite sectors, back to Unit 61486.
“The
 awareness level may be going up,” said Mr. Kurtz of CrowdStrike. “But 
the Chinese are not slowing down. They keep plowing away.”
David E. Sanger contributed reporting from Washington.
...............................................
ltn
紐時報導:中國第二支網軍現形 專偷歐美日航太技術
 2014-06-10  22:33
〔本報訊〕美國網路安全公司今天揭露,中國軍方建立了一支編號「61486」的網路駭客部隊,竊取歐美日政府部門、國防承包商及航太、衛星產業的機密資料,以精進中國的太空技術。但中國政府否認此事,還反批美國政府無權指責他國的駭客行為。數年前就被爆建立「61398」部隊
美國媒體和網路安全公司數年前就曾披露,中國人民解放軍建立了一支編號「61398」的網路駭客部隊,用以監控、入侵美國政府的機密情報、控制美國基礎設施,並竊取美國企業的各種重要資訊和技術。不過由防毒公司邁克菲(McAfee)前資深主管創立,與美國政府有合作關係的美國網路安全公司CrowdStrike今天指控,中國人民解放軍除了「61398」外,還有一支編號「61486」的網路駭客部隊,主要任務就是竊取歐美日政府和企業的航太與衛星技術。
CrowdStrike表示,一位名為「陳平」(Chen Ping,音譯)的人士登記了數個曾發動網路攻擊的網域。而陳平在個人網誌透露自己是35歲的中國職業軍人,相簿中還放有「61486」網路駭客部隊上海根據地的照片。
