Did China Authorize Major High Level Hack on US & It’s Allies?

 

Google announced it has discovered a phishing scam based in China, looking to uncover email passwords of important government officials. 

Chinese hackers broke into the personal Gmail accounts of senior officials and military personnel of the US government and its allies and stole sensitive data, setting the stage for an era of heightened cyber tension between the world's top military powers.

Hackers unleashed malware or phishing scam to highjack the accounts of government functionaries, military top brass and journalists in what appears to be a selective attack on key targets, especially political rivals of China, from where the cyber criminals launched their attack.

The hack attack came to light just a day after it was revealed that the US government was planning to bring in legislation declaring cyber attacks as acts of war.

The latest hack attack, which might bring Google and the Chinese administration into a fresh fistfight, was precisely planned and executed, raising doubts if the Chinese state had authorized it.

Google has not ruled out the chances of a state-sponsored hack attack. The report says there is no evidence suggesting that the cyber criminals were in Chinese government payrolls.

However, there have been serious allegations against the Chinese state machinery in the past over cyber attacks on the US and allies. Experts have said in the past that, for China, cyber warfare fits into the scheme of things.

China has long regarded cyberwarfare as a critical component of asymmetrical warfare in any future conflict with the US From China's perspective, it makes sense to use any means possible to counter America's huge technological advantage. Sneaking into the email systems of high-profile sensitive targets could be just a precursor to daring attacks on critical computer networks supporting a country's security. The US has realized the scope and gravity of cyber attacks and their utility in real warfare.

That is why the US decided to change it military rule book to accommodate provisions for retaliatory strikes on hacker groups and their state sponsors if critical US infrastructure, military installations or other national assets come under attack.

According to the Pentagon, planned retaliatory strikes against cyber criminals can come within the gamut of laws governing armed conflict. When an enemy deals a crippling blow to the country's assets by means of a cyber attack, it can be considered as an act of war.

When warranted, the US will respond to hostile acts in cyberspace as we would to any other threat to our country, the White House said a fortnight ago.

The US, the country's nuclear reactors, pipelines and mass transport systems are especially vulnerable. The US is vulnerable to sabotage in defence, power, telecommunications, banking. An attack on any one of those essential infrastructures could be as damaging as any kinetic attack on US soil,  former Pentagon cyber expert Sami Saydjari is reported to have said. 

The US military is also on high alert for possible hack attacks, especially by Chinese and Russian hackers.

Many experts share the feeling that sophisticated cyber attacks can deal crippling blows on enemy states. The US has decided to be up to speed with the developments, and that's why the Pentagon now considers cyber attacks on critical installations as acts of war. 
Ein News: http://bit.ly/1HmIdMF

« Google's New AI System is 'Machine Learning' Breakthrough
CIA Say Edward Snowden 'taught ISIS to avoid detection' »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Renaissance

Renaissance

Renaissance is Ireland's premier value added distributor of IT security solutions and a leading independent provider of business continuity consultancy.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

ThreatQuotient

ThreatQuotient

ThreatQuotient delivers an open and extensible threat intelligence platform to provide defenders the context, customization and collaboration needed for increased security effectiveness.

Zerocopter

Zerocopter

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

Data Protection People

Data Protection People

Data Protection People are specialists in Data Privacy, Governance, and Information Security.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

Bugraptors

Bugraptors

BugRaptors is a certified software testing company with extensive experience as a third-party testing vendor, effectively proven as a leader in software testing & QA Services.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

Matrixforce

Matrixforce

Matrixforce is a vetted IT support provider that uses the patented Delta Method of streamlining technology for financial and professional service firms to reduce complexity and avoid risk.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

Bit Sentinel

Bit Sentinel

Bit Sentinel is an information security company. We help companies like yours discover, prioritize, and effectively remediate potential cybersecurity risks.

Orbis Cyber Security

Orbis Cyber Security

Orbis is one of the leading cybersecurity company in USA. Our cybersecurity specialist defends your data, combat threat, and modernize your compliance.

iConnect IT Business Solutions DMCC

iConnect IT Business Solutions DMCC

iConnect is a trusted IT Solutions and Technology Services company, proudly serving clients across the Middle East and Africa.

Texas Cyber Solutions

Texas Cyber Solutions

Texas Cyber Solutions are elite cybersecurity advisors based in Houston, Texas providing network security solutions, penetration testing, and more.