Mobile App Security

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 23 May 2013

Hackers Find China Is Land of Opportunity

Posted on 10:39 by Unknown

New York Times

Gilles Sabrie for The New York Times
A booth for a British company’s products at a law enforcement trade show in Beijing. Chinese companies there boasted of their ability to hack into and monitor computers and cellphones.

By EDWARD WONG


Published: May 22, 2013 91 Comments
BEIJING — Name a target anywhere in China, an official at a state-owned company boasted recently, and his crack staff will break into that person’s computer, download the contents of the hard drive, record the keystrokes and monitor cellphone communications, too.

Pitches like that, from a salesman for Nanjing Xhunter Software, were not uncommon at a crowded trade show this month that brought together Chinese law enforcement officials and entrepreneurs eager to win government contracts for police equipment and services.
“We can physically locate anyone who spreads a rumor on the Internet,” said the salesman, whose company’s services include monitoring online postings and pinpointing who has been saying what about whom.
The culture of hacking in China is not confined to top-secret military compounds where hackers carry out orders to pilfer data from foreign governments and corporations. Hacking thrives across official, corporate and criminal worlds. Whether it is used to break into private networks, track online dissent back to its source or steal trade secrets, hacking is openly discussed and even promoted at trade shows, inside university classrooms and on Internet forums.
The Ministry of Education and Chinese universities, for instance, join companies in sponsoring hacking competitions that army talent scouts attend, though “the standards can be mediocre,” said a cybersecurity expert who works for a government institute and handed out awards at a 2010 competition.
Corporations employ freelance hackers to spy on competitors. In an interview, a former hacker confirmed recent official news reports that one of China’s largest makers of construction equipment had committed cyberespionage against a rival.
One force behind the spread of hacking is the government’s insistence on maintaining surveillance over anyone deemed suspicious. So local police departments contract with companies like Xhunter to monitor and suppress dissent, industry insiders say.
Ai Weiwei, the dissident artist, said he had received three messages from Google around 2009 saying his e-mail account had been compromised, an increasingly common occurrence in China among people deemed subversive. When the police detained him in 2011, he said, they seized 200 pieces of computer equipment and other electronic hardware.
“They’re so interested in computers,” Mr. Ai said. “Every time anyone is arrested or checked, the first thing they grab is the computer.”
There is criminal hacking, too. Keyboard jockeys break into online gaming programs and credit card databases to collect personal information. As in other countries, the police here have expressed growing concern.
Some hackers see crime as more lucrative than legitimate work, but opportunities for skilled hackers to earn generous salaries abound, given the growing number of cybersecurity companies providing network defense services to the government, state-owned enterprises and private companies.
“I have personally provided services to the People’s Liberation Army, the Ministry of Public Security and the Ministry of State Security,” said a prominent former hacker who used the alias V8 Brother for this interview because he feared scrutiny by foreign governments. He said he had done the work as a contractor and described it as defensive, but declined to give details.
And “if you are a government employee, there could be secret projects or secret missions,” the hacker said.
But government jobs are usually not well paying or prestigious, and most skilled hackers prefer working for security companies that have cyberdefense contracts, as V8 Brother does, he and others in the industry say.
Self-trained, the hacker teamed up with China’s patriotic “red hackers” more than a decade ago. Then he began working for cybersecurity companies and was recently making $100,000 a year, he said.
V8 Brother said this cyberworld was so arcane that senior Chinese officials did not know details about computer work at government agencies. “You can’t even explain to them what you’re doing,” he said. “It’s like explaining computer science to a construction worker.”

In Washington, officials criticize what they consider state-sponsored attacks. The officials say intrusions against foreign governments and businesses are growing, and the Pentagon this month accused the Chinese military of attacking American government computer systems and military contractors. The White House, which has ordered cyberattacks against Iran, has made cybersecurity a priority in talks with China. The Chinese Foreign Ministry says China opposes hacking attacks and is itself a victim.
The furor in Washington intensified in February after The New York Times and other news organizations published details of hacking efforts against their own networks and the findings of a new report by a cybersecurity company, Mandiant. The report said a shadowy group within the People’s Liberation Army, Unit 61398, ran a formidable hacking and espionage operationagainst foreign entities out of a building on the outskirts of Shanghai.
In China, the unit is just one part of the complex universe of hacking and cybersecurity. And the military units are not a well-kept secret. At least four former employees of Unit 61786, responsible for cryptography and information security, have posted résumés on job-search Web sites listing employment in the unit.
Another job seeker reported employment in Unit 61580; the unit has engineers specializing in “computer network defense and attack,” according to the Project 2049 Institute, a nongovernmental organization in Virginia that studies security and policy issues in Asia.
Members of Unit 61398, the bureau mentioned by Mandiant, have written several papers on hacking and cybersecurity with professors at Shanghai Jiaotong University, which has a prominent information security department. Across China, the universities labeled jiaotong — meaning communications — are taking the lead in building such departments. The military recruits at the universities and runs its own training center, the P.L.A. Information Engineering University, in the city of Zhengzhou.
But cybersecurity experts here say the schools often churn out students who know theory but lack practical skills. That could explain why many Chinese hacking attacks that have been discovered do not appear very sophisticated. American cybersecurity experts say attacks from Chinese groups often occur only from 9 to 5 Beijing time. And unlike, say, the Russians, Chinese hackers do not tend to cloak their movements, said Darien Kindlund, manager of the threat intelligence group for FireEye, a cybersecurity firm in Milpitas, Calif.
“They’re using the least amount of sophistication necessary to accomplish their mission,” Mr. Kindlund said. “They have a lot of manpower available, but not necessarily a lot of intelligent manpower to conduct these operations stealthily.”
The culture of hacking began in China in the late 1990s. The most famous underground group then was Green Army. One sign of how hacking has gone mainstream is the fact that the name of a later incarnation of Green Army — Lumeng — is now used by a top cybersecurity company in China. (Its English name is NSFOCUS.)
These companies are often started by prominent hackers or employ them to do network security. They have polished Web sites that list Chinese government agencies and companies as their clients. They also list foreign clients — at least one company,Knownsec, lists Microsoft — and have offices abroad.
The Web site of another company, Venustech, says its clients include more than 100 government offices, among them almost all the military commands. The company, which declined an interview request, has a hacking and cyberdefense research center.
Another former hacker said the monolithic notion of insidious, state-sponsored hacking now discussed in the West was absurd. The presence of the state throughout the economy means hackers often end up doing work for the government at some point, even if it is through something as small-scale as a contract with a local government office.
“I don’t think the West understands,” he said. “China’s government is so big. It’s almost impossible to not have any crossover with the government.”
Private corporations in China are employing hackers for industrial espionage, in operations that involve complex tiers of agents who hire the hackers. Sany Group, one of China’s biggest makers of construction equipment, hired hackers to spy on Zoomlion, a rival, according to official news media reports confirmed by the former hacker. Sany declined to comment.
That hacker said he knew the middleman agent who had hired cyberspies for Sany. The agent was a security engineer who owned two apartments in Beijing and had been under pressure to meet mortgage payments. “In China, everyone is struggling to feed themselves, so why should they consider values and those kinds of luxuries?” the former hacker said. “They work for one thing, and that’s for money.”
Jonathan Ansfield contributed reporting, and Mia Li contributed research.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Industry News, James Jones, Security, Security; Identity Management | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • LearningWorks: THE MISSING PIECE: Quantifying Non-Completion Pathways to Success
    ” . . . in the California Community College system . . . nearly one-third of students took an average of just two courses over about two yea...
  • Cisco Career Certifications Awarded American National Standards Institute Accreditation
    Achievement Demonstrates Compliance With Rigorous, Internationally Recognized Standards SAN JOSE, CA--(Marketwire - Jan 16, 2013) - Unders...
  • CyberWatch West Free Student 2 Student Webinar October 30th
    Online Workshop Oct 30 at 10:30 am PDT Man-in-the-Middle Attacks Using Mobile Devices Register @ cyberwatchwest.webex.com Student 2 Student ...
  • Spring 2013 NEW CCCApply Webinar Series
      Monday, 28 January 2013, TechEDge Written by Tim Calhoon Saturday, 26 January 2013 The New CCCApply online admissions application...
  • Community college grads out-earn bachelor's degree holders
    By Jon Marcus at The Hechinger Institute @CNNMoney February 26, 2013: 6:23 AM ET Nearly 30% of Americans with associate's degrees now ...
  • ACM CCECC Alice Summer Workshops Registration now open
    Registration has opened for the Alice Summer Workshops! A week has been set aside for a Community College focused workshop at Walt Disn...
  • CA Career Cafe: CALJOBS Job Search Service Now Available
    “ Somewhere someone is looking for exactly what you have to offer. ”                                                                    - ...
  • Code.org Launches To Help Make Computer Programming Accessible To Everyone
    Drew Olanoff ,  TechCrunch       Drew Olanoff has over 10 years of marketing, PR, customer service and support, relationship buildin...
  • EDGE goals addressed in 2013-14 California State Budget
    California's 2013-14 State Budget and an accompanying trailer bill, AB 86, address key EDGE goals of 1) beginning to restore dedicated f...
  • NCRIC Cyber Internship Program
    Northern California Regional Intelligence Center Cyber Internship Program Northern California Regional Intelligence Center (“NCRIC”) Mission...

Categories

  • Big Data
  • CATV
  • CENIC
  • Certifications
  • Cloud
  • Computational Thinking
  • Computer Engineering
  • Computer Science
  • CTE
  • Database
  • Digital Divide
  • Digital Literacy
  • Digital Media
  • Diversity
  • Educational Technology
  • elearning
  • Electronics
  • Entrepreneur
  • ethics
  • funding opportunity
  • Gaming
  • GIS
  • Grants
  • Hacking
  • Healthcare IT
  • ICT Applications
  • ICT Core Competencies
  • ICT Education
  • ICT Infrastructure
  • ICT Jobs
  • ICT pathways
  • ICT Regulation
  • ICT Research
  • Industry News
  • Innovation
  • Internships
  • James Jones
  • K-12
  • law
  • Linux
  • Mobility
  • MOOC
  • MPICT Announcements
  • Multimedia
  • Networking
  • networking security
  • Olivia Herriford
  • Open Source
  • Operating Systems
  • Pierre Thiry
  • Piracy
  • Public Policy
  • Security
  • Security; Identity Management
  • Smart Grid
  • Social Media
  • Soft Skills
  • Software Assurance
  • Software Engineering
  • Spanish
  • STEM Education
  • Storage
  • Teaching and Learning
  • Telecom
  • Tools
  • virtualization
  • Web
  • WIB
  • Wireless
  • women
  • Women in ICT
  • Workforce Development

Blog Archive

  • ▼  2013 (418)
    • ►  November (41)
    • ►  October (53)
    • ►  September (44)
    • ►  August (21)
    • ►  July (30)
    • ►  June (28)
    • ▼  May (43)
      • Latest Internet Trends from Mary Meeker
      • National Day of Civic Hacking - June 1-2, 2013
      • Employers, Education Providers, and Youth, Live in...
      • Neelie Kroes unveils Net Neutrality plan for Europ...
      • California Assembly Approves Overhaul of Public Sc...
      • Internet Homes Poised to Gobble Up Average of 74.5...
      • Stellar General Session Lineup At OTC'13
      • CVC: Your Distance Education Connection
      • NATIONAL INITIATIVE FOR CYBERSECURITY CAREERS & ST...
      • MOUSE Squad Student Tech Leadership Program
      • CSU-MB Online MS in Instructional Science and Tech...
      • McKinsey: The $33 Trillion Technology Payoff
      • Worldwide Youth Unemployment and Job Skills Challe...
      • Phone Firms Sell Data on Customers
      • Hackers Find China Is Land of Opportunity
      • Computer Science Moves Past 'Elective' Status in W...
      • Sorry, College Grads, I Probably Won't Hire You
      • Class of 2013: What's Pushing Women Out of the Sci...
      • How to Be a ‘Woman Programmer’
      • Advanced placement computer classes are now gettin...
      • ITIF: The Real Story on Guestworkers in the High-...
      • Demand for IT Grads Is Driving Up Supply, Recent S...
      • Molding the next generation of computer scientists
      • CA Career Cafe: CALJOBS Job Search Service Now Av...
      • CCC CTE Data Launchboard Project Launched
      • ITIF Just the Facts: The Benefits of Information a...
      • Cisco Career Certifications Awarded American Natio...
      • $ 3.1 Billion to S.T.E.M. Education
      • Center for Professional Excellence: 2013 Professi...
      • Senate passes Internet sales-tax bill
      • Microsoft confirms Windows Blue is coming
      • Forrester: 'Renegade' business execs drive IT stra...
      • 2013 Winter ICT Educator Conference - YouTube Pres...
      • Inspiring the next generation of IT workers
      • College Finds Flexibility and Growth with Certific...
      • Are all telephone calls recorded and accessible to...
      • Seeking CCC ICT and Information Systems Transfer M...
      • NetApp Delivers Storage and Data Management Expert...
      • CompTIA to Support White House’s IT Training and C...
      • High-Tech Startups Lacking Skilled Workers
      • 10 Most Desirable Tech Skills
      • San Francisco Mayor Signs Landmark Open Data Polic...
      • iPad is top selling tablet, but Android now most c...
    • ►  April (43)
    • ►  March (35)
    • ►  February (43)
    • ►  January (37)
  • ►  2012 (82)
    • ►  December (25)
    • ►  November (40)
    • ►  October (17)
Powered by Blogger.

About Me

Unknown
View my complete profile