All the latest UK technology news, reviews and analysis


Chinese military unit accused of cyber attacks on 141 companies

19 Feb 2013
China flag

Security firm Mandiant has issued a report claiming to link a Chinese military unit based in Shanghai's Pudong district to an unprecedented international cyber spying campaign.

The report claimed to have uncovered evidence connecting the so-called APT1 cyber espionage campaign to secretive branch of China's military, codenamed Unit 61398.

"Our analysis has led us to conclude that APT1 is likely government-sponsored and one of the most persistent of China's cyber threat actors," reads the report.

"We believe that APT1 is able to wage such a long-running and extensive cyber espionage campaign in large part because it receives direct government support."

Mandiant added that its investigation of AP1 is not finished, but that current evidence suggests the hacking group could have stolen hundreds of terabytes of data from over 140 organisations across the world.

The New York Times has since identified Unit 61398 as the Comment Crew, a hacker team the US currently believes is responsible for attacks on a number of businesses connected to the country's critical infrastructure.

APT1 is one of 20 advanced cyber campaigns being tracked by Mandiant.

At the time of publishing neither the US nor Chinese London embassies had responded to V3's request for comment on the report.

The report is the latest in a long line of tit-for-tat hacking allegations between the Chinese and US governments.

Earlier this year the New York Times and the Wall Street Journal issued reports claiming they were the victims of a malicious series of cyber attacks stemming from China.

The two publications both accused Chinese hackers of mounting the attacks as "payback" for a series of articles the paper published about Chinese prime minister Wen Jiabao.

In the past US authorities have warned that Chinese firms such as ZTE and Huawei could be influenced by the government to infiltrate networks in the West - allegations both firms strenously deny.

"Huawei and ZTE provide a wealth of opportunities for Chinese intelligence agencies to insert malicious hardware or software implants into critical telecommunications components and systems," read the US report last October.

"It appears under Chinese law, ZTE and Huawei would likely be required to co-operate with any request by the Chinese government to use their systems or access for malicious purposes."

However, other reports by the US have admitted they found no evidence of any wrong doing by Huawei. All the incidents underline the growing tensions between the US and China, despite leaders in both nations claiming this is not the case.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson
About

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?
21%
13%
4%
21%
31%
10%

Popular Threads

Powered by Disqus
Sony Xperia Z2 Tablet powered by Android KitKat 4.4

Sony Xperia Z2 Tablet video

We take a look at the lightweight, waterproof tablet

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv33

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery

rdc2

iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Post Trade Analyst - Business Analyst, middle office, STP, fina

Post Trade Analyst - Business Analyst, middle office...

Software Development Engineer

Develop: Customise: Configure. Maximise your technical...

C# Developer

C# Developer We are looking for a Mid-Weight C# Developer...

Service Desk Analyst

Service Desk Analyst - Central London Fragomen is...
To send to more than one email address, simply separate each address with a comma.