Cyberwars Heat Up In AsiaPac To Battle Chinese Aggression

From defense to attack: Governments in the Asia-Pacific region are strengthening their offensive cyberweapons in the fight against Chinese cyberwarfare targeting their countries.

Intrusions attributed by officials and experts to Beijing this year include targeting government-linked groups in South Korea, an Australian research institute, Taiwan’s ruling party and opposition politicians in Cambodia.

China’s Ministry of Foreign Affairs described the allegations as “absurd.” Beijing was “resolutely opposed to any form of cyberattack,” a spokesman said.

Yet the number of Asia-Pacific countries that have adopted offensive cyber abilities, defined as the ability to disrupt or damage systems and networks, has risen from four — China, North Korea, Pakistan and India — to at least 14, according to FireEye, a Silicon Valley cybersecurity company. Governments are also boosting cybersecurity spending, rewriting cyber-focused laws and strengthening monitoring agencies.

The moves mirror similar policy changes in the West. The Trump White House recently authorized “offensive cyber operations” against enemies of the U.S. The U.K. is preparing to launch a new cyberwarfare unit to counter online attacks from countries such as Russia, North Korea and Iran.

Officials rarely disclose their cyber operations or name countries linked to attacks, citing national security. However, the head of cybersecurity for one Asia-Pacific government says his department’s tactics include agents accessing Chinese networks to foil attacks “before they come to our front line.”

Experts say there has been a sharp increase in cyberattacks by China across the region over the past two years, partly as a result of Beijing’s 2015 deal with the U.S. to refrain from cyberespionage. After that agreement was signed, China redirected its focus toward Asia, according to Samm Sacks, a China cyber specialist at the Center for Strategic and International Studies, a Washington-based think tank.

“We saw a redirection of cyber activity originating from China, that initially had been going toward U.S. targets, reoriented toward other areas in the Asia region,” Sacks says.

Experts also point to China’s strengthened offensive capabilities, and the reorganization of its cyber bureaucracy under the control of President Xi Jinping, as evidence of the shift.

“They’re going after ministries of foreign affairs, any sort of policymaker that is going to give the Chinese government decision-making advantage,” says Benjamin Read, manager of cyberespionage analysis at FireEye.

Tsinghua University was the origin of cyberespionage campaigns earlier this year targeting the Tibetan community in India and the state government of Alaska, research has shown.

Experts say the shift toward offensive operations raises concerns about breaching international law.

“It is in a gray area [legally]. There are no clear definitions,” says the government cybersecurity chief, adding that, while attacks on the country did not always emanate from Chinese IP addresses, some had been traced to academic institutions linked to China’s military.

Australia is one of the few countries to publicly confirm its security agencies used offensive cyber actions to disrupt terrorist organizations, including ISIS.

Canberra has also banned Chinese telecommunication equipment-makers Huawei and ZTE from providing fifth-generation technology to Australian mobile phone operators amid national security concerns. The country was allegedly hit by Chinese cyberattacks on its Bureau of Meteorology in 2015 and the Australian National University this year. Beijing has denied involvement.

In New Zealand — a member of the Five Eyes intelligence network with Australia, the U.S., the U.K. and Canada — a policy paper released in July signaled the military wanted greater cyber powers. “To maintain relevant combat capabilities, including interoperability with close partners … the defense force needs to be able to conduct a broader range of cyber operations,” the document said.

Of nearly 400 serious cyber incidents hitting key New Zealand organizations in the year to the end of June 2017, 30 percent had indications of being linked to state-sponsored groups, according to an official in Wellington. China’s espionage activity also had a “heavy emphasis” in Southeast Asia, especially around regional meetings and events linked to the Association of Southeast Asian Nations, FireEye’s Read says.

In March, Indonesia launched a cyber agency under direct presidential control to curb a rising number of digital attacks. The agency chief, Djoko Setiadi, says “some attacks came from overseas,” and that the government’s online domain was the prime target.

OZY:

You Might Also Read:

China Compromises Tech Companies With Malicious Microchips

China Escalates Hacks On The US

« Algorithmic Warfare Is Coming. Humans Must Retain Control
Mobile Security Threats Put Businesses At Risk »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

Kualitatem

Kualitatem

Kualitatem Inc. is an independent software testing and information systems auditing company

Search Guard

Search Guard

Search Guard® is an Open Source security suite for #Elasticsearch and the entire #ELK stack that offers encryption, authentication, authorization, audit logging and multi tenancy.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

Lunio

Lunio

Lunio makes the internet a safer and more reliable place for everyone trying to grow their business by automatically getting rid of fake clicks, traffic, and leads on all ad platforms.

Corsica Technologies

Corsica Technologies

Corsica Technologies is recognized as one of the top managed IT and cybersecurity service providers. Our integrated IT and cybersecurity services protect companies and enable them to succeed.

Secuna Software Technologies

Secuna Software Technologies

Secuna is the most trusted Cybersecurity Testing Platform in the Philippines. Our pool of vetted security researchers will find and ethically report security vulnerabilities in your product.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Corona IT Solutions

Corona IT Solutions

At Corona IT Solutions, our team of specialists in networking, wireless and VoIP are dedicated to providing proactive monitoring and management of your IT systems.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.

Apexanalytix

Apexanalytix

Apexanalytix is a leading provider of supplier onboarding, risk management and recovery solutions.

Ncontracts

Ncontracts

Our mission at Ncontracts is to continually improve our clients’ ability to manage risk and compliance.