All the latest UK technology news, reviews and analysis


US traces Putter Panda malware to China

10 Jun 2014
The Putter Panda malware has been traced to China

A US security firm has accused the Chinese government of conducting a sophisticated cyber espionage campaign against US and European businesses, in another revelation that will further strain relations between the two nations.

Crowdstrike published a detailed report on Monday in which it revealed its research into a malware called ‘Putter Panda’ that was found spying on high-tech firms involved in space, aerospace and communications industries.

It traced the malware right to the heart of China, in a building in Shanghai that Crowdstrike said was likely being run by the Chinese People’s Liberation Army (PLA) 3rd Department 12th Bureau Unit 61486.

Crowdstrike outed a man named Chen Ping, aka 'cpyy', as being a member of the Chinese People’s Liberation Army (PLA) who was responsible for buying domains associated with Putter Panda.

Crowdstrike said the attacks targeted organisations' work through popular business tools such as Adobe Readers and Microsoft Office to deploy custom malware via email.

Crowdstrike CEO George Kurtz wrote that its findings was yet more proof the Chinese government was fully complicit in the hacking of Western industries, and proved the US was right to file charges against state officials last month.

“China’s decade-long economic espionage campaign is massive and unrelenting. Through widespread espionage campaigns, Chinese threat actors are targeting companies and governments in every part of the globe,” he said.

"Targeted economic espionage campaigns compromise technological advantage, diminish global competition, and ultimately have no geographic borders."

In response, a member of China's foreign ministry dismissed the allegations and repeated the line that the US is far more guilty of cyber hacking than China.

"The United States cannot pretend that it is the victim. They are a hacker empire. I think everyone in the world knows this," spokeswoman Hua Chunying said.

The latest research echoes a similar report by security firm Mandiant that traced another hacker group to Shanghai.

The US recently filed charges against five Chinese PLA officials in response to the Mandiant report. In response, China said it would start vetting Western technology and accused the US of hypocrisy in light of the Snowden spying revelations.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Dan Worth
About

Dan Worth is the news editor for V3 having first joined the site as a reporter in November 2009. He specialises in a raft of areas including fixed and mobile telecoms, data protection, social media and government IT. Before joining V3 Dan covered communications technology, data handling and resilience in the emergency services sector on the BAPCO Journal

View Dan's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

Windows 10 poll

What are your first impressions of Windows 10?
12%
5%
10%
4%
20%
3%
46%

Popular Threads

Powered by Disqus
V3 Sungard roundtable event - Cloud computing security reliability and scalability discussion

CIOs debate how to overhaul businesses for the digital era

V3 hosts roundtable with Sungard Availability Services

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv3may

Getting started with virtualisation

Virtualisation can help you reduce costs, improve application availability, and simplify IT
management. However, getting started can be challenging

ibmv3may

Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

Account Manager - Partners - Birmingham / UK travel

Account Manager - Partners - Birmingham / UK travel...

Technical Support Technician II

Title: Technical Support Technician II Employment Type...

Technical Support Technician I

Title: Technical Support Technician I Department: Client...

Administrator - Projects & Training

Administrator - Projects & Training Location...
To send to more than one email address, simply separate each address with a comma.