China Denies Targeted Cyber Attack

China has denied responsibility for alleged cyberattacks in the United States appearing to target exiled dissident  billionaire Guo Wengui, who has leveled corruption allegations against senior Communist Party officials and applied for political asylum. Guo accumalated his $60 billion fortune via property development.

The law enforcement agency said China had also provided the United States government with evidence that Guo, who has applied for political asylum in the United States, fabricated documents used to support his claims. It said China would make an official request for US authorities to investigate the matter. “The falsified official documents and the false information he fabricated are sensational and outrageous,” the ministry said in a rare English-language statement. Guo did not immediately respond to requests for comment. 

The Washington-based Hudson Institute think-tank was scheduled to host Guo in a rare public appearance last month, but canceled the event the day before without explanation. The event would have coincided with the visit of an official Chinese delegation to the US capital for a high-level law enforcement and cybersecurity dialogue between the two countries. 

The Hudson Institute said it had detected a Shanghai-based attack aimed at shutting down access to its website several days earlier. 

The suspected attack prompted a complaint from U.S. Attorney General Jeff Sessions during a meeting with China’s Public Security Minister Guo Shengkun, the Wall Street Journal reported. The New York-based Guo applied for US political asylum in September, but said this week the law firm representing him, Clark Hill PLC, had backed out after being targeted by Chinese hackers. Clark Hill lawyer Thomas Ragland, who lodged the asylum claim, confirmed he was no longer representing Guo, without elaborating. 

After his Hudson event was called off, Guo held a news conference where he produced what he claimed were “top-secret” official documents showing China had sent secret agents into the United States. 

China’s Ministry of Public Security said the documents shown by Guo were “clumsily forged” and “full of obvious mistakes”. 
Guo has made wide-ranging corruption allegations against senior Communist Party leaders via a daily stream of Twitter and YouTube posts since the start of the year, which he says are aimed at disrupting a key five-yearly Communist Party congress. 

The Chinese government has been seeking to discredit Guo, who is the subject of an Interpol red notice issued at Beijing’s request, as a criminal suspect who should not be trusted.

Ein News:

You Might Also Read:

China Wants To Use AI To Predict Civil Disorder:

US Asks China Not to Enforce Cybersecurity Law:

 

 

« M15 Issues A Threat Warning
Cyberwarfare: US Launches DDoS Attacks Against N. Korean Spy Agency »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

VMworld

VMworld

VMworld is a global conference for virtualization and cloud computing, including associated security issues.

Telos

Telos

Telos offers cybersecurity solutions and services that empower and protect the world’s most security-conscious enterprises.

GrammaTech

GrammaTech

GrammaTech is a leading developer of software-assurance tools and advanced cyber-security solutions.

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

DivvyCloud

DivvyCloud

DivvyCloud protects your cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

CoverWallet

CoverWallet

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

Kompleye

Kompleye

Kompleye is a recognized cybersecurity and compliance audit organization that offer a comprehensive solution for different industries.

Armolon

Armolon

Armolon provides comprehensive data breach and cybersecurity, as well cybersecurity audits and certifications, and disaster recovery/business continuity services to clients.

WinMagic

WinMagic

At WinMagic, we’re dedicated to making authentication and encryption solutions that protect data without causing user friction so that everyone can work freely and securely.

Block Harbor Cybersecurity

Block Harbor Cybersecurity

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity.

Prizsm Technologies

Prizsm Technologies

Prizsm is a computational storage capability that provides flexible, easy-to-use, resilient solutions for quantum-resistant, hyper-secure cloud storage and communications.