Tags: china | cyberspy | network

China-Based Cyberspy Network Targets U.S., World

Sunday, 29 Mar 2009 07:36 PM

Share:
  Comment  |
   Contact Us  |
  Print  
|  A   A  
  Copy Shortlink

OTTAWA — A shadowy cyber-espionage network based mostly in China has infiltrated government and private computers around the world, including those of the Dalai Lama, Canadian researchers said Sunday.

The network, known as GhostNet, infected 1,295 computers in 103 countries and penetrated systems containing sensitive information in top political, economic and media offices, the researchers said in a report.

Many of the compromised computers were found in the embassies of Asian countries, such as India, Indonesia, Malaysia, Pakistan, Thailand and Taiwan.

The embassies of Cyprus, Germany, Malta, Portugal and Romania as well as the foreign ministries of Bangladesh, Bhutan, Iran and Latvia were also targeted, and in most cases staff remained unaware that their systems had been attacked.

"Up to 30 percent of the infected hosts are considered high-value targets and include computers located at ministries of foreign affairs, embassies, international organizations, news media and NGOs," the report said.

The report, by the group Information Warfare Monitor, was commissioned by the Dalai Lama's office alarmed by possible breaches of security.

The 10-month investigation by specialists based at the University of Toronto found the spying was being done from computers based almost exclusively in China.

But researchers said while its findings were disturbing there was no conclusive evidence the Chinese government was involved, highlighting that China now had the world's highest number of Internet users.

"We do not know the motivation or the identity of the attackers or how to accurately characterize this network of infections as a whole," the report said.

"Attributing all Chinese malware to deliberate or intelligence gathering operations by the Chinese state is wrong and misleading," the report said.

"The sheer number of young digital natives online can more than account for the increase in Chinese malware."

In London, Chinese embassy spokesman Liu Weimin suggested the report was part of a Tibetan media and propaganda campaign.

"In China, it is against the law to hack into the computers of others, and we are victims of such cyber attack," Liu said. "It is a global challenge that requires global cooperation. China is an active participant in such cooperation in the world."

The investigation between June 2008 and March 2009 focused on the Tibetan community, thanks to the unparalleled access the team was given to Tibetan missions in Dharamsala as well as in London, Brussels and New York.

"The Tibetan computer systems we manually investigated ... were conclusively compromised by multiple infections that gave attackers unprecedented access to potentially sensitive information," the report said.

Their work led them to a broader operation that had infiltrated at least 1,295 computers in less than two years.

By installing malware on the computers, the China-based hackers were able to get the infected systems to send them top-secret information.

The researchers set up a "honey pot computer" to track down some of the malicious servers by monitoring the traffic that was generated from the honey pot once it was infected.

They found that three of the four control servers commanding infected computers to download secret files were located in China in Hainan, Guangdong and Sichuan. The fourth was located in the United States.

"From the evidence at hand, it is not clear whether the attacker(s) really knew what they had penetrated, or if the information was ever exploited for commercial or intelligence value," the report said.

"This report serves as a wake up call," the authors pointed out. "At the very least a large percentage of high-value targets compromised by this network demonstrate the relative ease with which a technically unsophisticated approach can quickly be harnessed to create a very effective spynet."

"Cyberpsace has empowered individuals and small groups of non-state actors to do many things, including executing sophisticated computer network operations that were previously only the domain of state intelligence agencies," the report said.

"We have entered the era of do-it-yourself signals intelligence."

GhostNet continues to invade and monitor more than a dozen new computers a week, the researchers warned.

However, they found no evidence that US government offices had been infiltrated, although a NATO computer was monitored by the spies for half a day and computers of the Indian Embassy in Washington were infiltrated.

Copyright © 2009 AFP. All rights reserved.

-

Share:
  Comment  |
   Contact Us  |
  Print  
  Copy Shortlink
Around the Web
Join the Newsmax Community
Please review Community Guidelines before posting a comment.
>> Register to share your comments with the community.
>> Login if you are already a member.
blog comments powered by Disqus
 
Email:
Country
Zip Code:
Privacy: We never share your email.
 
Hot Topics
Follow Newsmax
Like us
on Facebook
Follow us
on Twitter
Add us
on Google Plus
Around the Web
Top Stories
You May Also Like

Alan Dershowitz: Bill Clinton Is Wrong About Netanyahu

Tuesday, 16 Sep 2014 17:02 PM

Famed civil-rights lawyer Alan Dershowitz says Bill Clinton's view that Benjamin Netanyahu is "not the guy" for a peace  . . .

Census: Household Income Continues to Stagnate Under Obama

Tuesday, 16 Sep 2014 11:11 AM

The median U.S. household income remained nearly flat at $51,939 in 2013 compared with the previous year, according to f . . .

Business Roundtable CEOs See 'Underperforming' Economy

Tuesday, 16 Sep 2014 13:38 PM

Corporate CEOs apparently aren't too impressed with the economy. . . .

Most Commented

Newsmax, Moneynews, and Independent. American. are registered trademarks of Newsmax Media, Inc. Newsmax TV, NewsmaxWorld, NewsmaxHealth, are trademarks of Newsmax Media, Inc.

 
NEWSMAX.COM
America's News Page
©  Newsmax Media, Inc.
All Rights Reserved