Did China Authorize Major High Level Hack on US & It’s Allies?

 

Google announced it has discovered a phishing scam based in China, looking to uncover email passwords of important government officials. 

Chinese hackers broke into the personal Gmail accounts of senior officials and military personnel of the US government and its allies and stole sensitive data, setting the stage for an era of heightened cyber tension between the world's top military powers.

Hackers unleashed malware or phishing scam to highjack the accounts of government functionaries, military top brass and journalists in what appears to be a selective attack on key targets, especially political rivals of China, from where the cyber criminals launched their attack.

The hack attack came to light just a day after it was revealed that the US government was planning to bring in legislation declaring cyber attacks as acts of war.

The latest hack attack, which might bring Google and the Chinese administration into a fresh fistfight, was precisely planned and executed, raising doubts if the Chinese state had authorized it.

Google has not ruled out the chances of a state-sponsored hack attack. The report says there is no evidence suggesting that the cyber criminals were in Chinese government payrolls.

However, there have been serious allegations against the Chinese state machinery in the past over cyber attacks on the US and allies. Experts have said in the past that, for China, cyber warfare fits into the scheme of things.

China has long regarded cyberwarfare as a critical component of asymmetrical warfare in any future conflict with the US From China's perspective, it makes sense to use any means possible to counter America's huge technological advantage. Sneaking into the email systems of high-profile sensitive targets could be just a precursor to daring attacks on critical computer networks supporting a country's security. The US has realized the scope and gravity of cyber attacks and their utility in real warfare.

That is why the US decided to change it military rule book to accommodate provisions for retaliatory strikes on hacker groups and their state sponsors if critical US infrastructure, military installations or other national assets come under attack.

According to the Pentagon, planned retaliatory strikes against cyber criminals can come within the gamut of laws governing armed conflict. When an enemy deals a crippling blow to the country's assets by means of a cyber attack, it can be considered as an act of war.

When warranted, the US will respond to hostile acts in cyberspace as we would to any other threat to our country, the White House said a fortnight ago.

The US, the country's nuclear reactors, pipelines and mass transport systems are especially vulnerable. The US is vulnerable to sabotage in defence, power, telecommunications, banking. An attack on any one of those essential infrastructures could be as damaging as any kinetic attack on US soil,  former Pentagon cyber expert Sami Saydjari is reported to have said. 

The US military is also on high alert for possible hack attacks, especially by Chinese and Russian hackers.

Many experts share the feeling that sophisticated cyber attacks can deal crippling blows on enemy states. The US has decided to be up to speed with the developments, and that's why the Pentagon now considers cyber attacks on critical installations as acts of war. 
Ein News: http://bit.ly/1HmIdMF

« Google's New AI System is 'Machine Learning' Breakthrough
CIA Say Edward Snowden 'taught ISIS to avoid detection' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

MyCERT

MyCERT

MyCERT is the National Computer Emergency Response Team of Malaysia.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

Allgress

Allgress

Allgress solutions converge disparate risk silos across enterprise networks and automate governance, risk and compliance management processes.

Dataglobal

Dataglobal

Dataglobal is an industry-leading provider of Information Archiving/Governance and Unified Data Classification solutions.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

SECFORCE

SECFORCE

SECFORCE is a leading information security consultancy specialising in bespoke penetration testing and red team engagements.

VariQ

VariQ

VariQ is a premier provider of Cybersecurity, Software Development and Cloud services to federal, state, and local government.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Finnish Security & Intelligence Service (SUPO)

Finnish Security & Intelligence Service (SUPO)

The Finnish Security and Intelligence Service is a government agency tasked with combating serious threats to national security in Finland.

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance is a nonprofit, nonpartisan collaboration of individuals, businesses, government entities, and professionals advocating for more effective cyber security solutions.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.