Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

China is a Hacking Victim Too, Foreign Minister Says

China’s Foreign Minister, Yang Jiechi, says his country is calling for new rules and cooperation when it comes to Internet espionage issues. His comments were made to reporters on Saturday, during the annual session of the National People’s Congress.

China’s Foreign Minister, Yang Jiechi, says his country is calling for new rules and cooperation when it comes to Internet espionage issues. His comments were made to reporters on Saturday, during the annual session of the National People’s Congress.

In addition to calling for a team-up, Foreign Minister Jiechi also said that recent accusations that China was involved in a string of high-profile security incidents was part of an international smear campaign. His remarks, the New York Times noted, mark the first time an official with such a high rank has issued flat denials of this kind.

ChinaThe claims that China is on a hacking spree targeting international governments and high-value targets is built on shaky ground, he said. Adding that anyone “who tries to fabricate or piece together a sensational story to serve a political motive will not be able to blacken the name of others nor whitewash themselves.”

Jiechi’s remarks come on day before China’s news agency Xinhua ran a story proclaiming the nation as a victim of cybercrime – not an aggressor. According to China’s CERT, the United States is the top attacker against the country. Their data shows that in the previous 59 days, 2,196 servers in the U.S. controlled some 1.29 million systems in China.

Xinhua quoted an unnamed official from China’s National Internet Information Office as saying that a “large amount of facts have proven that for many years, China has been one of the primary victims of cyber attacks.”

Last month, U.S. security firm Mandiant released a scathing report naming China as the source for a string of attacks discovered earlier this year. In addition, Mandiant said that China’s army controls hundreds, perhaps thousands, of hackers in order to carry out these types of attacks and develop the weapons used during them, including groups like APT1.

In a report for SecurityWeek, Palo Alto Networks’ Wade Williamson commented on the report and listed some of the indicators organizations can look for if they suspect these types of attacks.

Meanwhile, the debate in Washington over cybersecurity continues, and no one is changing their stance when it comes to blaming China.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem