Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

China Hackers Increasingly Focused on US Infrastructure Firms: Mandiant

China’s PLA Controls Hackers: US IT Security Firm

Report Says China Hackers Increasingly Focused on Companies Involved in US Critical Infrastructure, Including Electrical Power Grid, Gas Lines and Water Systems.

China’s PLA Controls Hackers: US IT Security Firm

Report Says China Hackers Increasingly Focused on Companies Involved in US Critical Infrastructure, Including Electrical Power Grid, Gas Lines and Water Systems.

WASHINGTON – China’s army controls hundreds if not thousands of virulent and cutting-edge hackers, according to a report Tuesday by a US Internet security firm that traced a host of cyberattacks to an anonymous building in Shanghai.

Mandiant said its hundreds of investigations showed that groups hacking into US newspapers, government agencies, and companies “are based primarily in China and that the Chinese government is aware of them”.

China Blamed for Cyber AttacksThe 74-page report focused on one group, which it called “APT1” from the initials “Advanced Persistent Threat”. The New York Times, citing experts, said the group was targeting crucial infrastructure such as the US energy grid.

“We believe that APT1 is able to wage such a long-running and extensive cyber espionage campaign in large part because it receives direct government support,” Mandiant said.

The group, it said, was believed to be a branch of the People’s Liberation Army called Unit 61398, and digital signatures from its cyberattacks were traced back to the direct vicinity of a nondescript, 12-story building on the outskirts of Shanghai.

“We believe the totality of the evidence we provide in this document bolsters the claim that APT1 is Unit 61398,” it said, estimating it is “staffed by hundreds, and perhaps thousands of people”.

China’s defense ministry said its army had never supported any kind of hacking activity.

Advertisement. Scroll to continue reading.

“Not only are reports that China’s army has been involved in hacking unprofessional, they do not fit with the facts,” the ministry said in a statement to AFP.

“Hacking attacks are a global problem. Like other countries, China also faces the threat of hacking attacks, and is one of the main countries falling victim to hacking attacks.”

The country’s foreign ministry rejected “groundless accusations” of Chinese involvement in hacking and said China was itself a major victim, with most overseas cyberattacks against it originating in the US.

A series of brazen IT attacks on America’s most high-profile media outlets, reported by The New York Times and the Wall Street Journal, as well as on Twitter and others, have revived concerns over Chinese hackers.

The Times said hackers stole corporate passwords and accessed the personal computers of 53 employees after the newspaper published a report on the family fortune of China’s Premier Wen Jiabao.

Clients including The Times have hired Mandiant to clean up their systems after cyberattacks.

In its report, Mandiant alleged that APT1 — known also as “Comment Crew” for its practice of planting viruses on the comment sections of websites — has stolen hundreds of terabytes of data from at least 141 organizations spanning 20 industries.

The Times, which was given early access to the report, said the researchers had found that the Comment Crew was increasingly focused on companies involved in US infrastructure, including in its electrical power grid, gas lines and water works.

One target, the newspaper reported, was a company with remote access to more than 60 percent of oil and gas pipelines in North America.

In his recent State of the Union address, US President Barack Obama said the potential ability of outsiders to manipulate critical US infrastructure was a major concern.

“We know foreign countries and companies swipe our corporate secrets,” Obama said.

“Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, our air-traffic control systems. We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy.”

The building pinpointed as the hacking HQ sits in Shanghai’s northern suburb of Gaoqiao, near a petrochemical complex and surrounded by small shops.

There is no name plate outside, but framed posters showing soldiers are displayed on a high wall surrounding the complex, while the Chinese PLA’s symbol of a red star is mounted over the main door of the building.

One soldier in camouflage uniform stood at the main gate Tuesday, an AFP correspondent saw. Another wearing a PLA overcoat was stationed in the guard house, close to a sign reading “No photography” in both English and Chinese. 

Related Reading: Unit In China’s PLA Behind Massive Cyber Espionage Operation

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Security Infrastructure

Security vendor consolidation is picking up steam with good reason. Everyone wants to improve security efficiency and effectiveness while paying for less.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.

Security Infrastructure

Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a...

Funding/M&A

Responding to Cyber Threats Against Critical Infrastructures: Wired Business Media Acquires Long Running ICS Cybersecurity Conference Series

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...