習近平(2012年11月15日就職中共總書記談話): 「我們的人民熱愛生活,期盼有更好的教育、更穩定的工作、更滿意的收入、更可靠的社會保障、更高水平的醫療衛生服務、更舒適的居住條件、更優美的環境,期盼著孩子們能成長得更好、工作得更好、生活得更好。人民對美好生活的向往,就是我們的奮鬥目標。」 Worldwatch: 2nd China Army Unit Implicated in Online Spying

2014年6月10日 星期二

2nd China Army Unit Implicated in Online Spying

 just like the trade war between u.s and Japan in 1980s.



Photo

Researchers at Crowdstrike, a security company, believe this People's Liberation Army complex in Shanghai, surrounded by satellite dishes and dormitory-style residences, is the headquarters for a group of Chinese military hackers. Credit The New York Times

SAN FRANCISCO — The email attachment looked like a brochure for a yoga studio in Toulouse, France, the center of the European aerospace industry. But once it was opened, it allowed hackers to sidestep their victim’s network security and steal closely guarded satellite technology.
The fake yoga brochure was one of many clever come-ons used by a stealth Chinese military unit for hacking, said researchers at CrowdStrike, an Irvine, Calif., security company. Their targets were the networks of European, American and Japanese government entities, military contractors and research companies in the space and satellite industry, systematically broken into for seven years.
Just weeks after the Justice Department indicted five members of the Chinese army, accusing them of online attacks on United States corporations, a new report from CrowdStrike, released on Monday, offers more evidence of the breadth and ambition of China’s campaign to steal trade and military secrets from foreign victims.
The report, parts of which The New York Times was able to corroborate independently, ties attacks against dozens of public and private sector organizations back to a group of Shanghai-based hackers whom CrowdStrike called Putter Panda because they often targeted golf-playing conference attendees. The National Security Agency and its partners have identified the hackers as Unit 61486, according to interviews with a half-dozen current and former American officials.

Photo

George Kurtz, co-founder of CrowdStrike. Researchers there believe they have identified a group of Chinese hackers that for years has been systematically breaking into the networks of government entities and companies around the world. Credit Sam Hodgson for The New York Times

Those officials say the N.S.A. and its partners are currently tracking more than 20 hacking groups in China, over half of them units of the People’s Liberation Army, as they break into public and private sector companies ranging from satellite, drone and nuclear weapon component makers to technology and energy companies and research groups.
Unit 61486, researchers say, in some instances shared computing resources and communicated with members of Unit 61398, the P.L.A. unit whose members were the focus of last month’s indictments.
“If you look at all the groups that we track in China, the indictments are just the very tip of the iceberg,” said George Kurtz, a co-founder of CrowdStrike.
Knowledge of the attacks, which continue even now and are being reported for the first time, emerge amid an escalating conflict between the United States and China over online espionage.
Tensions had been simmering for years, but grew more pointed last year when an American cybersecurity company, Mandiant, identified Unit 61398 as the source of thousands of attacks on foreign companies. The Justice Department’s indictment last month named five members of that group and, for the first time, named some of its victims, which included Alcoa, Westinghouse Electric and the United States Steel Corporation.
In response, Chinese officials have denounced the indictments, denied the charges, cited recent revelations that the United States has engaged in its own cyberespionage, and announced retaliatory measures, including new inspection procedures for American technologies, all raising the prospect of a trade war.
The decision to issue indictments against the members of Unit 61398 has proved controversial, even inside the Obama administration. The members of the unit are almost certain never to see the inside of an American courtroom, and American officials fear that it could become more difficult to negotiate norms of behavior with China.
The same issue will arise in the case of this newly disclosed unit, whose operations pose as large a threat to American infrastructure as the one whose members have been indicted.
CrowdStrike’s forensic investigation revealed that members of Unit 61486 took steps to hide their origins — by using compromised foreign websites to launch their attacks, for instance — but left behind digital traces of their identities and whereabouts. The report does not name the companies that were targeted because of confidentiality agreements CrowdStrike has with clients.
The hackers’ tools were developed during working hours in Chinese time zones, researchers say, and Internet records show that in one case hackers used the same I.P. address as members of Unit 61398 to launch their attacks. The use of that address for simultaneous attacks suggests cooperation between Unit 61398 and Unit 61486, said Adam Meyers, CrowdStrike’s head of threat intelligence.
CrowdStrike, founded by two former executives of the security software company McAfee, is one of a new generation of computer security companies that specialize in so-called computer forensics.
Rather than reacting to attacks by hackers, the company tries to understand who hackers are and what methods they are using. It has released several reports on global hacking over the last year.
The firm’s investigation revealed that the group targeted its victims with custom malware disguised as emails containing PDF invitations to aerospace and satellite conferences, job postings and, in one case, the brochure for a yoga studio in Toulouse.
Once victims clicked on decoy files, they inadvertently downloaded malicious programs onto their computers. That opened the door for attackers to enter the victim’s network, see which other devices and networks their victim was connected to, and eventually steal trade secrets and design schematics for satellite and aerospace technology.
CrowdStrike’s researchers said they traced attacks on dozens of the company’s clients in the space and satellite industry to the group; the researchers say the list of victims could number in the hundreds, if not thousands.
In some cases, researchers said, attackers slipped up and registered websites used in their assaults under the same email address they used to register personal blog and social media accounts. In one case, an attacker deployed a remote access tool, or RAT, from a web domain registered to an email address that belonged to a onetime student at the School of Information Security Engineering at Shanghai Jiao Tong University, a top university long suspected of being a state recruiting ground for hackers.
Representatives for Shanghai Jiaotong did not respond to fax messages requesting comment.


In another case, an email address — which popped up repeatedly in Internet records for attack domains — was used to register a personal blog on Sina.com, the Chinese Internet portal, to a 35-year-old who listed the military as his profession. The soldier did not return requests for comment, but in security discussion forums, CrowdStrike’s researchers uncovered discussions between that person and two other hackers, whose noms de guerre, ClassicWind and Linxder, have been linked to members of Unit 61398.
The 35-year-old’s Picasa albums show photos of him in military training and celebrating his birthday with friends in military garb, and pictures of his dormitory, where P.L.A. officer hats are conspicuously in the background. And in his album labeled “office,” photos show a tall white building in Shanghai, surrounded by satellite dishes and dormitory-style residences. Researchers at CrowdStrike believe it is the headquarters for Unit 61486.
Visited by The New York Times, the P.L.A. headquarters — just north of downtown Shanghai in the Zhabei district — were clearly marked as a “military zone.” Soldiers guard the entrance to the building, which is surrounded by tall walls topped with wire fencing, a moat and trees that camouflage military satellite dishes. Viewed from nearby landmarks, the building is full of military personnel and patriotic military slogans.
Military analysts at the Project 2049 Institute, a defense research group in Arlington, Va., suspected that Unit 61486 supported China’s space surveillance network and maintained close ties with the Beijing Remote Sensing Research Institute, a state-sponsored organization whose mission is to explore “leading technologies in earth observation and the mechanisms for acquiring and distributing remote sensing information,” according to its website. The analysts never presented any evidence.
CrowdStrike believes its report offers the final proof. “We’ve got the gun, the bullet and the body,” Mr. Meyers said of evidence connecting attacks on its clients, in the space and satellite sectors, back to Unit 61486.
“The awareness level may be going up,” said Mr. Kurtz of CrowdStrike. “But the Chinese are not slowing down. They keep plowing away.”
David E. Sanger contributed reporting from Washington.
...............................................

ltn 

紐時報導:中國第二支網軍現形 專偷歐美日航太技術

 2014-06-10  22:33
〔本報訊〕美國網路安全公司今天揭露,中國軍方建立了一支編號「61486」的網路駭客部隊,竊取歐美日政府部門、國防承包商及航太、衛星產業的機密資料,以精進中國的太空技術。但中國政府否認此事,還反批美國政府無權指責他國的駭客行為。
  • 紐約時報報導,發現第二支中國軍方的網路駭客部隊61486,竊取歐美日的航太與衛星產業機密資料。(圖片擷取自紐約時報網頁) 紐約時報報導,發現第二支中國軍方的網路駭客部隊61486,竊取歐美日的航太與衛星產業機密資料。(圖片擷取自紐約時報網頁)

數年前就被爆建立「61398」部隊

美國媒體和網路安全公司數年前就曾披露,中國人民解放軍建立了一支編號「61398」的網路駭客部隊,用以監控、入侵美國政府的機密情報、控制美國基礎設施,並竊取美國企業的各種重要資訊和技術。
不過由防毒公司邁克菲(McAfee)前資深主管創立,與美國政府有合作關係的美國網路安全公司CrowdStrike今天指控,中國人民解放軍除了「61398」外,還有一支編號「61486」的網路駭客部隊,主要任務就是竊取歐美日政府和企業的航太與衛星技術。
CrowdStrike表示,一位名為「陳平」(Chen Ping,音譯)的人士登記了數個曾發動網路攻擊的網域。而陳平在個人網誌透露自己是35歲的中國職業軍人,相簿中還放有「61486」網路駭客部隊上海根據地的照片。

中國外交部反嗆美是「駭客帝國」

但中國外交部發言人華春瑩今天在記者會中,否認「61486」的存在,還反批美國政府自已也曾被爆出「稜鏡」監聽計劃,沒資格假裝自己是受害者,「美國是駭客帝國,這是地球人都知道的事實。」

熱門文章

總網頁瀏覽量

搜尋此網誌