China Denies Targeted Cyber Attack

China has denied responsibility for alleged cyberattacks in the United States appearing to target exiled dissident  billionaire Guo Wengui, who has leveled corruption allegations against senior Communist Party officials and applied for political asylum. Guo accumalated his $60 billion fortune via property development.

The law enforcement agency said China had also provided the United States government with evidence that Guo, who has applied for political asylum in the United States, fabricated documents used to support his claims. It said China would make an official request for US authorities to investigate the matter. “The falsified official documents and the false information he fabricated are sensational and outrageous,” the ministry said in a rare English-language statement. Guo did not immediately respond to requests for comment. 

The Washington-based Hudson Institute think-tank was scheduled to host Guo in a rare public appearance last month, but canceled the event the day before without explanation. The event would have coincided with the visit of an official Chinese delegation to the US capital for a high-level law enforcement and cybersecurity dialogue between the two countries. 

The Hudson Institute said it had detected a Shanghai-based attack aimed at shutting down access to its website several days earlier. 

The suspected attack prompted a complaint from U.S. Attorney General Jeff Sessions during a meeting with China’s Public Security Minister Guo Shengkun, the Wall Street Journal reported. The New York-based Guo applied for US political asylum in September, but said this week the law firm representing him, Clark Hill PLC, had backed out after being targeted by Chinese hackers. Clark Hill lawyer Thomas Ragland, who lodged the asylum claim, confirmed he was no longer representing Guo, without elaborating. 

After his Hudson event was called off, Guo held a news conference where he produced what he claimed were “top-secret” official documents showing China had sent secret agents into the United States. 

China’s Ministry of Public Security said the documents shown by Guo were “clumsily forged” and “full of obvious mistakes”. 
Guo has made wide-ranging corruption allegations against senior Communist Party leaders via a daily stream of Twitter and YouTube posts since the start of the year, which he says are aimed at disrupting a key five-yearly Communist Party congress. 

The Chinese government has been seeking to discredit Guo, who is the subject of an Interpol red notice issued at Beijing’s request, as a criminal suspect who should not be trusted.

Ein News:

You Might Also Read:

China Wants To Use AI To Predict Civil Disorder:

US Asks China Not to Enforce Cybersecurity Law:

 

 

« M15 Issues A Threat Warning
Cyberwarfare: US Launches DDoS Attacks Against N. Korean Spy Agency »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Intelligence-sec

Intelligence-sec

Intelligence-Sec is a fully integrated Conferences and Exhibitions Company managing and producing topical events for the security industry.

CDNetworks

CDNetworks

CDNetworks is a global content delivery network with a fully integrated cloud security solution, offering unparalleled speed, security and reliability for the almost instant delivery of web content.

Lockton

Lockton

Lockton is the world’s largest privately owned insurance brokerage firm. Commercial services include Cyber Risk insurance.

Cyber DriveWare

Cyber DriveWare

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

Bolton Labs

Bolton Labs

Bolton Labs is a leading provider cybersecurity services, tools, and analysis for MSPs and organizations who want to scale their security offerings.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

Adaptive Shield

Adaptive Shield

Addaptive Shield - Complete Control For Your SaaS Security. Proactively find and fix weaknesses across your SaaS platforms.

drie

drie

drie is an end-to-end cloud services company based in Bahrain, Dubai and London. We enable businesses to adopt, scale on and build for cloud.

Carson McDowell

Carson McDowell

Carson McDowell are one of Northern Ireland's leading law firms. We are the law firm of choice for many of Northern Ireland's Top 100 companies as well as international companies doing business here.

Argentra

Argentra

Argentra is a specialist engineering company, we have years of experience developing custom security software and providing security risk consulting.

CY4GATE

CY4GATE

CY4GATE was conceived to design, develop and produce technologies and products that are able to meet the most stringent and modern requirements of Cyber Intelligence & Cyber Security.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

Trium Cyber

Trium Cyber

Trium Cyber - Expert Cyber Underwriting and Claims Management. Based in the US and UK. Backed by Lloyd’s of London.

RKON

RKON

RKON Technologies provides managed IT and cybersecurity services to organizations across various industries, helping businesses mitigate risks and secure their digital infrastructures.