Affichage des articles dont le libellé est spear-phishing. Afficher tous les articles
Affichage des articles dont le libellé est spear-phishing. Afficher tous les articles

vendredi 21 décembre 2018

Nation of Thieves

U. S. charges Chinese hackers in theft of vast trove of confidential data in 12 countries
By Ellen Nakashima and David J. Lynch

Prosecutors unsealed an indictment charging two Chinese with computer hacking attacks on a wide range of U.S. government agencies and corporations. 

The United States and four of its closest allies on Thursday blamed China for a 12-year campaign of cyberattacks that vacuumed up technology and trade secrets from corporate computers in 12 countries, affecting almost every major global industry.
The coordinated announcements in five capitals marked the Trump administration’s broadest anti-China initiative to date, yet it fell short of even stronger measures that officials had planned.
During debate, Treasury Secretary Steven Mnuchin blocked a proposal to impose financial sanctions on those implicated in the hacking, according to five sources familiar with the matter. 
Two administration officials said Mnuchin acted out of fear that sanctions would interfere with U.S.-China trade talks.
The centerpiece of Thursday’s synchronized accusations came in Washington, where the Justice Department unveiled indictments against two Chinese hackers, who it said acted “in association with” the Chinese Ministry of State Security (MSS).
Zhu Hua and Zhang Shilong, members of a hacking squad known as “Advanced Persistent Threat 10” or “Stone Panda,” were accused of conspiracy to commit computer intrusions, wire fraud and aggravated identity theft while pilfering “hundreds of gigabytes” of confidential business data, the indictment said.
“China’s goal, simply put, is to replace the U.S. as the world’s leading superpower, and they’re using illegal methods to get there,” said FBI Director Christopher A. Wray.
U.S. allies echoed the Justice Department action, signaling a growing consensus that Beijing is flouting international norms in its bid to become the world’s predominant economic and technological power.
Xi Jinping's empty promises
In the capitals of the United Kingdom, Australia, Canada and New Zealand, ministers knocked China for violating a 2015 pledge — offered by Chinese dictator Xi Jinping in the White House’s Rose Garden and repeated at international gatherings such as the Group of 20 summit — to refrain from hacking for commercial gain.
“This campaign is one of the most significant and widespread cyber intrusions against the U.K. and allies uncovered to date, targeting trade secrets and economies around the world,” British Foreign Secretary Jeremy Hunt said in a statement.
Still, some administration allies were skeptical that Thursday’s announcement would alter China’s behavior.

Deputy Attorney General Rod J. Rosenstein announces on Thursday the indictments of two Chinese for hacking attacks. 

“Just as when the Obama administration did it, indicting a handful of Chinese agents out of the tens of thousands involved in economic espionage is necessary but not important,” said Derek Scissors, a China analyst at the American Enterprise Institute. 
“International denouncements may irritate Xi, but they place no real pressure on him.”
Scissors said it would be more effective for the United States to hit high-profile Chinese companies with financial sanctions, including potential bans on their ability to do business with American companies.
The five governments that joined in the statements about China are partners in the “Five Eyes” intelligence alliance, sharing some of their most closely guarded technical and human reporting.
The foreign ministries of Denmark, Sweden and Finland tweeted statements saying they shared the concerns over rampant cyberespionage against corporations.
The united front against Chinese hacking and economic espionage stands in contrast to the “America First” president’s preference for taking a unilateral course to many of his trade goals.
“This demonstrates there’s a strong well of international support the United States can tap... Countries are fed up,” said Ely Ratner, executive vice president of the Center for a New American Security.
The hackers named in the indictment presided over a state-backed campaign of cybertheft that targeted advanced technologies with commercial and military applications. 
They also hacked into companies called “managed service providers,” which act as gatekeepers to computer networks serving scores of corporate clients.
The Chinese targeted companies in the finance, telecommunications, consumer electronics and medical industries, along with U.S. government laboratories operated by the National Aeronautics and Space Administration and the military.
Along with the United States and the United Kingdom, countries targeted by China include Canada, France, Germany, Japan, Sweden and Switzerland.
“The list of victim companies reads like a who’s who of the global economy,” said Wray.
The Stone Panda team made off with personal information, including Social Security numbers belonging to more than 100,000 U.S. Navy personnel.
The hackers employed a technique known as “spear-phishing,” tricking computer users at the business and government offices into opening malware-infected emails giving them access to log-in and password details.
They worked out of an office in Tianjin, China, and engaged in hacking operations during working hours in China.
Geoffrey Berman, the U.S. attorney for the Southern District of New York, called the Chinese ­cyber-campaign “shocking and outrageous.”
Over the past seven years, more than 90 percent of cases alleging economic espionage involved China as did more than two-thirds of trade-secret theft prosecutions, according to Deputy Attorney General Rod J. Rosenstein.
The industries targeted in the Stone Panda hacks are featured in the Chinese government’s Made in China 2025 program, which aims to supplant the United States as the global leader in 10 advanced technologies including artificial intelligence, robotics and quantum computing, Rosenstein added.
In November, in one of his last official actions, then-Attorney General Jeff Sessions announced a major initiative to combat Chinese commercial spying, building on four years of prosecutorial effort. The department vowed to aggressively pursue trade-secret theft cases and identify researchers and defense industry employees who have been “co-opted” by Chinese agents seeking to transfer technology to China.
While the show of anti-China unity was notable, the administration pulled back from plans for tougher action after warnings from the treasury secretary.
Mnuchin’s 11th-hour intervention left administration officials fearing Beijing would view the limited actions as a sign that Trump lacks the stomach for an all-out confrontation.
“We don’t comment on sanctions actions or deliberations, but it’s important to note that these issues are completely separate from trade,” said a Treasury Department spokesman asked to comment on the reports.
The administration’s action entailed statements from four Cabinet agencies — Justice, State, Energy and Homeland Security — while Treasury remained on the sidelines.
The condemnations also pose a complication as Trump and Xi seek to negotiate a trade deal. 
Over dinner in Buenos Aires earlier this month, the two leaders agreed to a truce in their months-long tariff war.
Talks between U.S. and Chinese diplomats are expected to begin early next month.
The Trump administration is seeking a deal that would involve structural changes to China’s state-led economic model, greater Chinese purchases of American farm and industrial products and a halt to what the United States says are coercive joint-venture licensing terms.
The indictments were followed by a joint statement from Secretary of State Mike Pompeo and Homeland Security Secretary Kirstjen Nielsen that assailed China for violating Xi’s landmark 2015 pledge to refrain from hacking U.S. trade secrets and intellectual property to benefit Chinese companies.
“These actions by Chinese actors to target intellectual property and sensitive business information present a very real threat to the economic competitiveness of companies in the United States and around the globe,” they said.
Thursday’s push to confront China over its cyber-aggression comes at a fraught time, as Canada has arrested a Chinese telecommunications executive at the United States’ request on a charge related to violating sanctions against Iran.

vendredi 16 mars 2018

Chinese Hackers Hit U.S. Firms Linked to South China Sea Dispute

Victims are in maritime industries with South China Sea ties
By David Tweed

Chinese hackers have launched a wave of attacks on mainly U.S. engineering and defense companies linked to the disputed South China Sea, the cybersecurity firm FireEye Inc. said.
The suspected Chinese cyber-espionage group dubbed TEMP.Periscope appeared to be seeking information that would benefit the Chinese government, said FireEye, a U.S.-based provider network protection systems. 
The hackers have focused on U.S. maritime entities that were either linked to -- or have clients operating in -- the South China Sea, said Fred Plan, senior analyst at FireEye in Los Angeles.
“They are going after data that can be used strategically, so it is line with state espionage,” said Plan, whose firm has tracked the group since 2013. 
“A private entity probably wouldn’t benefit from the sort of data that is being stolen.”
The TEMP.Periscope hackers were seeking information in areas like radar range or how precisely a system in development could detect activity at sea, Plan said. 
The surge in attacks picked up pace last month and was ongoing.

Increased Attacks
FireEye declined to name any targets. 
Although most were based in the U.S., organizations in Europe and at least one in Hong Kong were also affected, the firm said.
Plan said Chinese cyber-attacks on U.S. targets has picked up in recent months, after both sides agreed not to attack civilian entities. 
The 2015 deal to tamp down economic espionage was hammered out between then-U.S. President Barack Obama and Xi Jinping.
The U.S. indicted five Chinese military officials in 2014 on charges that they stole trade secrets from companies including Westinghouse Electric Co. and United States Steel Corp. after hacks were detected by Mandiant, a unit of FireEye. 

Strategic Data
Data sought in the latest incidents could be used, for instance, to determine how closely a vessel could sail to a geographical feature, Plan said. 
It is definitely the case that they can use this information for strategic decision-making,” he said.
The U.S. Navy sometimes conducts so-called freedom of navigation operations to challenge Chinese claims to more than 80 percent of the South China Sea -- one of the world’s busiest trading routes. China has reclaimed some 3,200 acres (1,290 hectares) of land in the waters and built ports, runways and other military infrastructure on seven artificial features it has created.
China has been involved in other attacks related to the South China Sea. 
In 2015, during a week-long hearing on a territorial dispute in the water, Chinese malware attacked the website of the Permanent Court of Arbitration in the Hague, taking it offline.
The latest attacks were carried out using a variety of techniques including “spear-phishing,” in which emails with links and attachments containing malware are used to open back doors into computer networks. 
In some examples, the emails were made to look as if they originated from a “big international maritime company,” Plan said.
FireEye said in a separate report that government offices, media and academic institutions have been attacked, along with engineering and defense companies. 
Plan declined to comment when asked whether the U.S. Navy was among the targets.
“Given the type of organizations that have been targeted -- the organizations and government offices -- it is most likely the case that TEMP.Periscope is operating on behalf of a government office,” Plan said.