China Denies Targeted Cyber Attack

China has denied responsibility for alleged cyberattacks in the United States appearing to target exiled dissident  billionaire Guo Wengui, who has leveled corruption allegations against senior Communist Party officials and applied for political asylum. Guo accumalated his $60 billion fortune via property development.

The law enforcement agency said China had also provided the United States government with evidence that Guo, who has applied for political asylum in the United States, fabricated documents used to support his claims. It said China would make an official request for US authorities to investigate the matter. “The falsified official documents and the false information he fabricated are sensational and outrageous,” the ministry said in a rare English-language statement. Guo did not immediately respond to requests for comment. 

The Washington-based Hudson Institute think-tank was scheduled to host Guo in a rare public appearance last month, but canceled the event the day before without explanation. The event would have coincided with the visit of an official Chinese delegation to the US capital for a high-level law enforcement and cybersecurity dialogue between the two countries. 

The Hudson Institute said it had detected a Shanghai-based attack aimed at shutting down access to its website several days earlier. 

The suspected attack prompted a complaint from U.S. Attorney General Jeff Sessions during a meeting with China’s Public Security Minister Guo Shengkun, the Wall Street Journal reported. The New York-based Guo applied for US political asylum in September, but said this week the law firm representing him, Clark Hill PLC, had backed out after being targeted by Chinese hackers. Clark Hill lawyer Thomas Ragland, who lodged the asylum claim, confirmed he was no longer representing Guo, without elaborating. 

After his Hudson event was called off, Guo held a news conference where he produced what he claimed were “top-secret” official documents showing China had sent secret agents into the United States. 

China’s Ministry of Public Security said the documents shown by Guo were “clumsily forged” and “full of obvious mistakes”. 
Guo has made wide-ranging corruption allegations against senior Communist Party leaders via a daily stream of Twitter and YouTube posts since the start of the year, which he says are aimed at disrupting a key five-yearly Communist Party congress. 

The Chinese government has been seeking to discredit Guo, who is the subject of an Interpol red notice issued at Beijing’s request, as a criminal suspect who should not be trusted.

Ein News:

You Might Also Read:

China Wants To Use AI To Predict Civil Disorder:

US Asks China Not to Enforce Cybersecurity Law:

 

 

« M15 Issues A Threat Warning
Cyberwarfare: US Launches DDoS Attacks Against N. Korean Spy Agency »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

cPacket Networks

cPacket Networks

cPacket’s distributed intelligence enables network operators to proactively identify imminent issues before they negatively impact end-users.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

Fairfirst Insurance

Fairfirst Insurance

Fairfirst Cyber Insurance protects your business assets against the complexity of cyber threats.

AmWINS Group

AmWINS Group

AmWINS are a global specialty insurance distributor with expertise in property, casualty and professional lines including cyber liability.

Guardara

Guardara

Guardara's mission is to help our customers to continuously improve in every aspect of software development.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

Agile Underwriting

Agile Underwriting

Agile, an underwriting agency, insurtech and Coverholder at Lloyd's, provides niche insurance products across Aviation, Marine & Cargo, Cyber and Financial Lines.

Motiv ICT Security

Motiv ICT Security

Motiv is the ICT security specialist that provides public and private sector organisations with IT security solutions and services to prevent cybercrime, data theft and data breaches.

QuSecure

QuSecure

QuSecure provides a software-driven security architecture that overlays your current infrastructure and provides next-generation security to protect your entire network from quantum threats.

Upstack

Upstack

UPSTACK - One partner, end-to-end expertise, helping develop the solutions you need – when you need them.

Unisys

Unisys

Unisys is a global information technology company providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

MajorKey Technologies

MajorKey Technologies

MajorKey improves security performance by reducing user friction and business risk, empowering your people, and protecting your IP.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

Oduma Solutions

Oduma Solutions

Oduma Solutions is a wholly owned Ghanaian Cybersecurity company that offers information security services to organisations seeking to improve their security posture.