China's Cyber-Espionage Victims Fell Prey to Mundane Ruses: US

Advertisement
By Associated Press | Updated: 21 May 2014 12:28 IST
The hacking techniques the U.S. government says China used against American companies turned out to be disappointingly mundane, tricking employees into opening email attachments or clicking on innocent-looking website links.

The scariest part might be how successfully the ruses worked. With a mouse click or two, employees at big-name American makers of nuclear and solar technology gave away the keys to their computer networks.

(Also see: US Accuses China of Cyber-Espionage Targeting American Firms)

In a 31-count indictment announced on Monday the Justice Department said five Chinese military officials operating under hacker aliases such as "Ugly Gorilla," ''KandyGoo" and "Jack Sun" stole confidential business information, sensitive trade secrets and internal communications for competitive advantage. The U.S. identified the alleged victims as Alcoa World Alumina, Westinghouse, Allegheny Technologies, U.S. Steel, United Steelworkers Union and SolarWorld.

Advertisement

China denied it all on Tuesday.

"The Chinese government and Chinese military as well as relevant personnel have never engaged and never participated in so-called cybertheft of trade secrets," Foreign Ministry spokesman Hong Lei said in Beijing. "What the United States should do now is withdraw its indictment."

Advertisement

(Also see: Chinese State Media Calls US a 'Mincing Rascal' Over Spying Allegations)

That's unlikely. What the Justice Department is doing is spelling out exactly how it says China pulled it off.

Advertisement

The U.S. says the break-ins were more slapstick than professional spy work. In some cases, the government says, the hackers used "spear-phishing" - a well-known scam to trick specific companies or employees into infecting their own computers.

The hackers are said to have created a fake email account under the misspelled name of a then-Alcoa director and fooled an employee into opening an email attachment called "agenda.zip," billed as the agenda to a 2008 shareholders' meeting. It exposed the company's network. At another time, a hacker allegedly emailed company employees with a link to what appeared to be a report about industry observations, but the link instead installed malicious software that created a back door into the company's network.

Advertisement

"We are so used to solving problems by clicking an email link, looking at the information and forwarding it on," said Chris Wysopal, a computer security expert and chief technology officer of the software-security firm Veracode. "And if hackers know about you and your company, they can create really realistic-looking messages."

And use of the rudimentary efforts the Justice Department described doesn't mean foreign governments and others won't use more sophisticated and harder-to-detect techniques, said Joshua Corman, the chief technology officer for Sonatype, which helps businesses make their software development secure. Determined hackers escalate their attacks when necessary, he said, but in the cases cited in the federal indictment announced Monday, they didn't have to escalate very far.

Corman noted that the U.S. has much higher investments in research and intellectual property, making America's risk of loss in such thefts disproportionately higher than China's.

Other security layers failed in the hackings blamed on China, too. More-effective antivirus or security software could have blocked the malicious attachments or prevented users from visiting risky web links. Back-end server filters could have prevented dangerous emails from reaching employees. Intrusion-detection systems on corporate networks could have more quickly raised red flags internally after a successful break-in.

"The problem is the technology hasn't advanced enough to detect malicious code," said Kevin Mitnick, the famous hacker who now works as a corporate security consultant. Tricking someone to let you into the system is far easier than identifying hidden vulnerabilities that can be exploited.

Even worse: Employees, by their nature, are socially conditioned to want to open and respond to an email that purports to be from the boss - never mind that the message may actually be a trick.

"If you start with an incorrect assumption that every email that comes in is a real email," said Hossein Eslambolchi, chief executive at security company CyberFlow Analytics, "you're putting yourself and your corporation at a major risk."

 

For details of the latest launches and news from Samsung, Xiaomi, Realme, OnePlus, Oppo and other companies at the Mobile World Congress in Barcelona, visit our MWC 2025 hub.

Advertisement

Related Stories

Popular Mobile Brands
  1. OnePlus 15T Confirmed to Launch With a Larger Battery, Faster Charging
  2. Vivo T5x 5G AnTuTu Score Exceeds 1 Million Points, Will Launch in India Soon
  3. Nothing Phone 4a vs Motorola Edge 70: Price in India, Features Compared
  4. Lava Bold 2 5G India Launch Teased; Company Teases Design Ahead of Debut
  5. Oppo Pad 5 Review
  6. Moto Watch Review: The Best Smartwatch Under Rs. 6,000 in 2026?
  7. Honor 600 Lite Launched With 6,520mAh Battery and This Dimensity Chipset
  8. MWC 2026: Oppo, MediaTek Showcase Next Generation of AI Phones
  1. ISS Crew Prepares to Send Japan’s HTV-X1 Cargo Spacecraft Back to Earth After Four Months
  2. OpenAI’s Codex App Is Now Available on Windows, Can Be Downloaded via Microsoft Store
  3. OpenAI Teases GPT-5.4 AI Model Launch Just a Day After Releasing GPT-5.3 Instant
  4. Nothing Headphone (a) Launched With Adaptive ANC, Customisable Controls: Price, Specifications
  5. Granny OTT Release Date: When and Where to Watch the Village Mystery Thriller Online?
  6. Andhaka OTT Release: Where to Watch the Telugu Drama-Thriller Online?
  7. Pookie OTT Release: When and Where to Watch Vijay Antony’s Romantic Drama Online?
  8. WhatsApp Plus Paid Subscription Reportedly in Development With Additional Customisation Options, Up to 20 Pinned Chats
  9. Samsung Patent Hints at Potential Clamshell-Style Foldable With Two Cover Displays
  10. Google Introduces Gemini 3.1 Flash-Lite as Its Fastest and Most Cost-Efficient AI Model
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.