China’s Hackers Have Stolen EU, US & Global Secrets

A US Justice Department indictment  issued on 20th December, announced the criminal indictment of two individuals, Zhu Hua and Zhang Shilong, who were alleged to be part of A 

The Five Eyes intelligence group (US, UK, Australia, Canada and New Zealand) believe that China has been using hackers and sometimes students as short term hackers before they go into often overseas academic study. 

These hackers have been used to gather military, technology and commercial information and secrets from other countries in-order to support and improve China’s intelligence and commercial positon in the World. China’s group of best hackers known as APT10, which is short for “Advanced Persistent Threat”, hacking group decided to target not just individual companies in its long-standing efforts to steal intellectual property, but instead focus on so-called Managed Service Providers (MSPs). 
They are the companies that offer electronic systems like data backup and password management under a subscription model. If hackers can get into a MSP’s data system, then they can down-load information from the commercial, and or government, data/secrets collections. 

The indictment suggests that China by hacking into a particular New York MSP, was able to steal data from companies in lots of countries, from Chile to the Australia. 

This secret intrusion process allowed China to gather information from a wide variety of businesses, parts of government and industries from telecoms, IT to banking and manufacturing. Foreign Secretary UK, Jeremy Hunt said:

“This campaign is one of the most significant and widespread cyber intrusions against the UK and allies uncovered to date, targeting trade secrets and economies around the world.

"These activities must stop. They go against the commitments made to the UK in 2015, and, as part of the G20, not to conduct or support cyber-enabled theft of intellectual property or trade secrets.

"Our message to governments prepared to enable these activities is clear: together with our allies, we will expose your actions and take other necessary steps to ensure the rule of law is upheld”.

MSP Attack
These hacks often begin with an email saying that a particular issue is important and needs attention. The message appears to be legitimate and seems to come from a supply partner company and asks the receiver to open an attached file. 
However, this is a phishing email that, once opened lets the hacker have access to passwords et al. Even if some of the security systems tried to block access the hackers would change the IP address and continue the hacking process. 
Once these Chinese hackers had established themselves on a computer, they would download more malware until they get what they are after.

Using these systems and collection processes the hackers have got massive amounts of valuable information and data since at least 2014.

These Chinese hackers stole hundreds of gigabytes of data from dozens of companies, the indictment suggests. While the Justice Department didn’t name any specific victims, the Department of Homeland Security has set up a page providing guidance for any company that thinks it might have been attacked. 

No Armistice
This whole process is now set against the China/American agreement from three years ago that they would not hack each other’s commercial businesses.  China like other major countries has used these hacking system attacks and intrusions in ways that are similar to different methods that have been used over the centuries for one nation to gather and governmentally and commercial use secrets from another country for their own benefit.

News  by CSI:

You Migt Also Read 

China Has “taken the gloves off” In Hacking Attacks:

 

« Publishers Need Micro-Payments Now
Prosecutors Sue Facebook Over Cambridge Analytica »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infineon Technologies

Infineon Technologies

Infineon is a leader in semiconductor solutions for a huge range of applications including automation, smart systems and security for the Internet of Things.

mmCERT

mmCERT

mmCERT is the national Computer Emergency Response Team for Myanmar.

Niksun

Niksun

Niksun's forensics-based cyber security and network performance monitoring products provide customers with actionable insight into security threats, performance issues, and compliance risks.

Cyber Security Raad (CSR) - Netherlands

Cyber Security Raad (CSR) - Netherlands

The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government undertaking efforts at strategic level to bolster cyber security in the Netherlands.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

Ampliphae

Ampliphae

Ampliphae gives you an easy-to-deploy, sophisticated and affordable cloud-discovery, security and compliance platform.

SecurityGate

SecurityGate

SecurityGate.io is the only Integrated Risk Management platform built for OT/ICS cybersecurity. The leading Risk Assessment Platform for Critical Infrastructure.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

Earlybird Venture Capital

Earlybird Venture Capital

Earlybird is a venture capital investor focused on European technology innovators.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.

Cognisys Group

Cognisys Group

Cognisys provides cyber security penetration testing and compliance services from its offices in Leeds and Manchester.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

Communications Fraud Control Association (CFCA)

Communications Fraud Control Association (CFCA)

CFCA is the premier International Association for fraud risk management, fraud prevention and profitability control.

Bulletproof Solutions

Bulletproof Solutions

Bulletproof provides IT expert support, services, and guidance to businesses small and large as they grow and adapt to today’s complex IT, cybersecurity, and compliance needs.

TerraEagle

TerraEagle

Terraeagle is a boutique cyber security services company providing tailor-made solutions. Our core competency is in SOCaaS, MDRaaS & and Incident Response Retainer Services.

Barrier Networks

Barrier Networks

Barrier Networks are a Cyber Security Managed Service Provider that specialises in Network and Application security.