China Escalates Hacks On The US

In 2015 the US and China agreed to a digital truce that banned hacking private companies to steal trade secrets. 
And though the agreement has been touted as a success, it hasn't stopped Chinese state-sponsored hackers from pushing the envelope of acceptable behavior. 

Moreover, it certainly hasn't slowed types of hacking that fall outside the purview of the accord. Lately, it seems, that means defense intelligence gathering.

In recent weeks, Chinese hackers have reportedly breached a US Navy contractor that works for the Naval Undersea Warfare Center, stealing 614 GB of data about submarine and undersea weapons technology. 

Attacks in the last few months originating from China have also targeted US satellite and geospatial imaging firms, and an array of telecoms. The incidents highlight the clandestine but incessant hacking campaigns that continue reliably between the US and China.

"China’s actually backed off quite a bit on intellectual property theft, but when it comes to military trade secrets, military preparedness, military readiness, satellite communications, anything that involves the US’s ability to keep a cyber or military edge, China has been very heavily focused on those targets," says David Kennedy, CEO of the threat tracking firm Binary Defense Systems, who formerly worked at the NSA and with the Marine Corps' signal intelligence unit.  "And the US does the same thing, by the way." 'They'll use that as a first step instead of having to send fighter jets or something.'

The submarine contractor breach reflects this intense focus on bridging any technological advantage the US may have. It involved attacks in January and February that nabbed important data, albeit from an unclassified network. When taken together, though, the information would have amounted to a valuable snapshot of US cutting edge underwater weapons development, plus details on a number of related digital and mechanical systems.

The attack fits into a known pattern of Chinese hacking initiatives. "China will continue to use cyber-espionage and bolster cyber-attack capabilities to support its national security priorities," US director of national intelligence Daniel Coats wrote in a February threat report. 

"The Intelligence Community and private-sector security experts continue to identify ongoing cyber-activity from China...Most detected Chinese cyber-operations against US private industry are focused on cleared defense contractors or IT and communications firms."

Recently, analysts from Symantec also published research on a series of attacks in the same category from November 2017 to April from a hacking group dubbed Thrip. Though Symantec does not go so far as to identify Thrip as Chinese state-sponsored hackers, it reports "with high confidence" that Thrip attacks trace back to computers inside the country. 

The group, which Symantec has tracked since 2013, has evolved to hide in plain site by mostly using prefab malware to infiltrate networks and then manipulating administrative controls and other legitimate system tools to bore deeper without setting off alarms. 

All of these off-the-shelf hacking tools and techniques have made Thrip harder to identify and track, which is likely the idea, but Symantec started to notice patterns in their anomaly detection scanners that ultimately gave these attacks away, and led the researchers to a unique backdoor that implicated Thrip.

The researchers found evidence of intrusions at some southeast Asian telecom firms, a US geospatial imagery company, a couple of private satellite companies including one from the US, and a US defense contractor. 
The breaches were all deliberate and targeted, and in the case of the satellite firms the hackers moved all the way through to reach the control systems of actual orbiting satellites, where they could have impacted a satellite's trajectory or disrupted data flow.

"It is scary," says Jon DiMaggio, a senior threat intelligence analyst at Symantec who leads the research into Thrip. "We looked at which systems they were interested in, where they spent the most time, and on the satellites it was command and control. And then they were also on the operational side for both the geospatial imagery and the telecom attacks."

Though hacking for intelligence-gathering is a priority for all nations and can sometimes be mutually tolerated, Binary Defense Systems' Kennedy points out that it can also serve as a way to make a statement when two countries are at odds. He notes that it's not surprising to detect escalating hacking operations from China against the US given rising geopolitical tensions between the two countries about trade and increased tariffs. 

"Hacking can be used as a sign of force in a lot of cases to say 'hey, we’re not happy and we’re going to make you feel some pain,'" Kennedy notes. "They'll use that as a first step instead of having to send fighter jets or something."

Though Chinese hacking was brought under control somewhat by the 2015 agreement, analysts say that China's nation state hackers have reorganized and retooled over the last few years to be even more stealthy and effective in their digital espionage operations. And recent attacks indicate that they are optimising their plans to get the most valuable information they can out of each victim.

"All of these pieces fit together," Symantec's DiMaggio says of Thrip. "It’s not targets of opportunity; it’s definitely a planned operation."

Wired

You Might Also Read: 

Inside The Chinese-Hacking Underground:

Chinese Hack Breached US Satellites:
 

« Theft & Subsequent Re-Use of Cyber Weapons
Cybercrime & Terrorism Threaten South Africa »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

Telesoft Technologies

Telesoft Technologies

Telesoft Technologies is a global provider of cyber security, telecom and government infrastructure products and services.

Blake, Cassels & Graydon (Blakes)

Blake, Cassels & Graydon (Blakes)

Blakes is one of Canada’s top business law firms serving national and international clients in specialist areas including cyber security.

CyberSure

CyberSure

CyberSure is a programme of collaborations and exchanges between researchers aimed at developing a framework for creating and managing cyber insurance policy for cyber systems.

Wiser Market

Wiser Market

Wiser Market is a leading company in global online brand protection services, intellectual property protection, anti-Counterfeit & trademark infringements.

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

Wontok

Wontok

Wontok deliver innovative value-added data security services that fill the gaps left in traditional security solutions.

European Cyber Competence Network

European Cyber Competence Network

The purpose of the European Cyber Competence Network is to retain and develop the cybersecurity technological and industrial capacities of the EU necessary to secure its Digital Single Market.

Lattice Semiconductor

Lattice Semiconductor

Lattice Semiconductor solves customer problems across the network, from the Edge to the Cloud, in the growing communications, computing, industrial, automotive and consumer markets.

VCG Group

VCG Group

VCG provides everything you need for the design, implementation and management of data centres, cyber-secure enterprise networks, cloud and connectivity services.

R-Tech

R-Tech

R-Tech GmbH manages the digital start-up initiative, whose goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.

Vernetzen

Vernetzen

Vernetzen is an industrial network and cybersecurity innovator focused on delivering practical solutions to connect and secure industry across the globe.