Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
APC Free White Paper
Optimize your network investment &
Enter to win a Samsung Galaxy Note

www.apc.com
CIO Issues
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
China Denies Its Army Is Behind Hack Attacks
China Denies Its Army Is Behind Hack Attacks

By Jennifer LeClaire
February 20, 2013 12:12PM

    Bookmark and Share
"Attribution is, of course, very difficult to obtain for cyber-attacks, which can be routed through compromised servers around the world," said security expert Richard Wang. "While the Chinese deny the claims in the Mandiant report, it would be naive to assume that any major government, Eastern or Western, has not extended its espionage capabilities."
 



The New York Times and The Wall Street Journal are pointing fingers of accusation at China in the wake of hacking incidents. China is pointing back.

China is responding to a damaging report from security firm Mandiant. The report suggests APT1, a prolific cyber-espionage group that has conducted attacks on a number of victims since at least 2006, is likely sponsored by the Chinese government and is one of the most persistent of China's threat actors.

Groundless Criticism?

Ministry of National Defense spokesman Geng Yansheng said China had been the victim of cyber-attacks that have originated in the United States, and that Mandiant mischaracterized China's activities, according to a New York Times report.

"Chinese military forces have never supported any hacking activities," Geng said at a press briefing. "The claim by the Mandiant company that the Chinese military engages in Internet espionage has no foundation in fact."

Hong Lei, a spokesman for China's Foreign Ministry, also briefed the press on Tuesday. According to China.org.cn, he said cyber-crime is an international problem and should be solved through international cooperation on the basis of mutual trust and respect.

"Groundless criticism is irresponsible and unprofessional, and it will not help to solve the problem," he said. "China has called on the international community to make a code of conduct for cyberspace on the basis of the submission and make joint efforts to build a peaceful, secure, open and cooperative cyberspace."

Who's Naive Now?

So who is right? Are U.S. companies overreacting or is China covering secret operations against the U.S.? Or both?

Richard Wang, manager at SophosLabs U.S., said Mandiant put together a convincing case that one of the cyber-attack groups it follows is linked to the Chinese government.

"Attribution is, of course, very difficult to obtain for cyber-attacks, which can be routed through compromised servers around the world," he said. "While the Chinese deny the claims in the Mandiant report, it would be naive to assume that any major government, Eastern or Western, has not extended its espionage capabilities into the online realm."

Meanwhile, he continued, it is important to remember that although the report mentions a significant number of attacks over several years, that is tiny compared with the thousands of attacks daily from common cyber-criminals.

"Advanced persistent threats (APTs) are comparatively few and far between. If you are in a high-risk industry such as aerospace or defense, or tasked with securing government systems, then APTs should be on your list of concerns," Wang said. "However, for less frequently targeted industries, focusing too much on APT at the expense of your day-to-day network security is not a wise strategy."
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 CIO Issues
1.   BlackBerry Acquires Secusmart
2.   BlackBerry BES 10 Now Hosted
3.   Teaming Up: CIOs, IT Asset Managers
4.   Chinese Man Charged with Hacking
5.   Chinese Hackers Hit U.S. Officials


advertisement
Backlash Stirs Against H-1B Visas
Debate over foreign workers continues.
Average Rating:
BlackBerry Acquires Secusmart
German security firm offers street cred.
Average Rating:
BlackBerry BES 10 Now Hosted
More choices, flexibility for biz users.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Canadian Government Charges China With Cyberattack
The government of Canada is not happy with China. Canadian officials have accused "a highly sophisticated Chinese state-sponsored actor" of launching a cyberattack on its National Research Council.
 
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 

Enterprise Hardware Spotlight
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Watson Gets His First Customer Service Gig
Since appearing on Jeopardy, IBM's Watson supercomputer has been making a living using his super-intelligent knowledge base for business verticals. Now, Watson's been hired for his first customer service job.
 
Tablet Giants Apple and Samsung Feel the Heat
When a company saturates its home market with a once-hot product, expect it to pump up efforts elsewhere. Apple, for its part, is now pushing iPads to big corporations and the enterprise market.
 

Mobile Technology Spotlight
Android 'Fake ID' Puts Millions of Users at Risk
Having this fake ID is nothing to brag about, even if you are a minor. The “Fake ID” Android flaw drops malware into smartphone apps. It can steal credit card data and even take over your device.
 
FTC Wants Fix for 'Perfect Scam' of Mobile Cramming
The U.S. Federal Trade Commission has issued new guidelines to curb “mobile cramming,” a troublesome practice that adds unauthorized third-party charges to mobile phone bills.
 
Facebook: You Will Use Messenger, and You Will Like It
Starting this week, Facebook users with Android and iOS phones will be forced to use the separate Messenger app to send Facebook messages. Pending messages will still be visible in the main app.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.