Chinese hackers target oil companies: McAfee (AFP)
Thursday, February 10, 2011 1:01 PM
WASHINGTON (AFP) – Hackers from China hit penetrated machine networks of orbicular lubricator companies, concealing business documents on invitation plans and another private information, a US machine section firm said Thursday.
"Starting in November 2009, integrated furtive and targeted cyberattacks hit been conducted against orbicular oil, energy, and petrochemical companies," the Santa Clara, California-based McAfee said in a report.
In constituent to attacking consort computers, the hackers struck "individuals and executives in Kazakhstan, Taiwan, Greece, and the United States to take copyrighted and highly private information," McAfee said.
"Files of interest focused on effective lubricator and pedal earth production systems and business documents related to earth exploration and bidding."
The industrialized espionage charges are the latest leveled against hackers in China, which was accused in a inform by the US-China Economic and Security Review Commission terminal year of waging large attacks on US machine systems.
McAfee did not identify any of the companies targeted by the hackers. But it said every of the evidence spinous to the attackers existence supported in China.
"We hit identified the tools, techniques, and meshwork activities utilised in these continuing attacks -- which we hit dubbed Night Dragon -- as originating primarily in China." McAfee said.
Hacking tools "widely available on the Asiatic underground" were utilised to break into a company's intranet and obtain access to huffy desktops and servers, it said.
"They proceeded to enter to another machines (targeting executives) and exfiltrating telecommunicate archives and another huffy documents," McAfee said.
The machine section firm said "many actors" took part in the attacks but it had identified an individualist in Heze City, Shandong Province, who provided the "crucial (command and control) stock to the attackers."
"Although we don't conceive this individualist is the intellectual behindhand these attacks, it is likely this person is alive or has aggregation that can support identify at small some of the individuals, groups, or organizations answerable for these intrusions," it said.
McAfee said "all of the identified data exfiltration state occurred from Beijing-based IP addresses and operated exclusive the individual companies weekdays from 9:00 am to 5:00 pm Peiping time."
This suggests, it said, "that the participating individuals were 'company men' working on a regular job, rather than worker or amateur hackers."
"Although it is doable that every of these indicators are an enlarge red-herring operation fashioned to pin the blessed for the attacks on Asiatic hackers, we conceive this to be highly unlikely," McAfee said. "We hit strong evidence suggesting that the attackers were supported in China."
In Jan 2010, Google said it had been the direct of cyberattacks originating in China which included attempts to access the telecommunicate accounts of Asiatic manlike rights activists around the world.
China has denied involvement in the Dec 2009 cyberattacks which Google said also targeted more than 20 another companies and led the cyberspace giant to halt counterintelligence of its see engine in China.
According to US diplomatic files obtained and publicised by WikiLeaks, the United States believes that China's activity directed the hacking crusade into computers of Google and Western governments.
In digit cable, the US embassy in Peiping said it learned from "a Asiatic contact" that the Politburo had led years of hacking into computers of the United States, its allies and Tibet's sacred cheater the Dalai Lama.
US Director of National Intelligence James Clapper told Congress on weekday that US machine systems were increasingly reaching under attack.
Clapper, who did not specifically advert China, told a congressional NGO that there had been a "dramatic increase" over the past year in vindictive cyber state targeting US computers and networks.
"Almost two-thirds of US firms inform that they hit been the individual of cybersecurity incidents or aggregation breaches, patch the volume of vindictive code on American networks more than tripled from 2009," Clapper said.
Source
0 comments:
Post a Comment