Chinese Hackers Behind US Ransomware Attacks: Security Firms

Advertisement
By Reuters | Updated: 15 March 2016 09:50 IST
Hackers using tactics and tools previously associated with Chinese government-supported computer network intrusions have joined the booming cybercrime industry of ransomware, four security firms that investigated attacks on US companies said.

Ransomware, which involves encrypting a target's computer files and then demanding payment to unlock them, has generally been considered the domain of run-of-the-mill cybercriminals.

But executives of the security firms have seen a level of sophistication in at least a half dozen cases over the last three months akin to those used in state-sponsored attacks, including techniques to gain entry and move around the networks, as well as the software used to manage intrusions.

"It is obviously a group of skilled of operators that have some amount of experience conducting intrusions," said Phil Burdette, who heads an incident response team at Dell SecureWorks.

Advertisement

Burdette said his team was called in on three cases in as many months where hackers spread ransomware after exploiting known vulnerabilities in application servers. From there, the hackers tricked more than 100 computers in each of the companies into installing the malicious programs.

Advertisement

The victims included a transportation company and a technology firm that had 30 percent of its machines captured.

Security firms Attack Research, InGuardians and G-C Partners, said they had separately investigated three other similar ransomware attacks since December.

Advertisement

Although they cannot be positive, the companies concluded that all were the work of a known advanced threat group from China, Attack Research Chief Executive Val Smith told Reuters.

The ransomware attacks have not previously been reported. None of the companies that were victims of the hackers agreed to be identified publicly.

Advertisement

The security companies investigating the advanced ransomware intrusions have various theories about what is behind them, but they do not have proof and they have not come to any firm conclusions.

Most of the theories flow from the possibility that the Chinese government has reduced its support for economic espionage, which it pledged to oppose in an agreement with the United States late last year. Some US companies have reported a decline in Chinese hacking since the agreement.

Smith said some government hackers or contractors could be out of work or with reduced work and looking to supplement their income via ransomware.

It is also possible, Burdette said, that companies which had been penetrated for trade secrets or other reasons in the past were now being abandoned as China backs away, and that spies or their associates were taking as much as they could on the way out. In one of Dell's cases, the means of access by the team spreading ransomware was established in 2013.

The cyber-security experts could not completely rule out more prosaic explanations, such as the possibility that ordinary criminals had improved their skills and bought tools previously used only by governments.

Dell said that some of the malicious software had been associated by other security firms with a group dubbed Codoso, which has a record of years of attacks of interest to the Chinese government, including those on US defence companies and sites that draw Chinese minorities.

Payment in Bitcoin
Ransomware has been around for years, spread by some of the same people that previously installed fake anti-virus programs on home computers and badgered the victims into paying to remove imaginary threats.

In the past two years, better encryption techniques have often made it impossible for victims to regain access to their files without cooperation from the hackers. Many ransomware payments are made in the virtual currency Bitcoin and remain secret, but institutions including a Los Angeles hospital have gone public about ransomware attacks.

Ransomware operators generally set modest prices that many victims are willing to pay, and they usually do decrypt the files, which ensures that victims will post positively online about the transaction, making the next victims who research their predicament more willing to pay.

Security software companies have warned that because the aggregate payoffs for ransomware gangs are increasing, more criminals will shift to it from credit card theft and other complicated scams.

The involvement of more sophisticated hackers also promises to intensify the threat.

InGuardians CEO Jimmy Alderson said one of the cases his company investigated appeared to have been launched with online credentials stolen six months earlier in a suspected espionage hack of the sort typically called an Advanced Persistent Threat, or APT.

"The tactics of getting access to these networks are APT tactics, but instead of going further in to sit and listen stealthily, they are used for smash-and-grab," Alderson said.

© Thomson Reuters 2016

 

Also seeCryptocurrency Prices across Indian exchanges

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Bitcoin, Cyber attack, Internet, Ransomware
Advertisement

Related Stories

Popular Mobile Brands
  1. Motorola Razr 70 Could Launch Soon as Foldable Phone Visits TDRA Database
  2. iQOO 15R Battery Capacity, Thickness Announced by Company
  3. Redmi K Pad 2 Tipped to Feature Bose-Tuned Speakers and This MediaTek Chip
  4. Infinix Note 60, Note 60 Pro, Note 60 Ultra May Be Sold in These Variants
  5. Oakley Meta Glasses Now Available in India for Athletes
  6. Nothing Phone 4a Series Tipped to Launch Globally on This Date
  7. How to Reset Your Instagram Reels Algorithm
  1. AI Identifies More Than 1,300 Unusual Objects in Hubble Space Telescope Images
  2. Scientists Track Rapidly Growing Sunspot Behind Intense Solar Storms Toward Earth
  3. Motorola Razr 70 Global Launch Seems Imminent as Foldable Phone Visits UAE’s TDRA Certification Database
  4. Crypto Wrench Attacks Surged in 2025, Total Recorded Losses Hit $41 Million: Report
  5. Philips TAA1009 In-Ear, SHP9500 Headphones Launched in India Alongside New Soundbar, Speaker Models
  6. Supreme Court Questions WhatsApp Policy of Sharing User Data With Meta Entities
  7. Nintendo Switch Becomes Best-Selling Nintendo Console Ever; Switch 2 Sales Cross 17 Million Units
  8. NASA’s Perseverance Makes History on Mars with Claude AI at the Helm
  9. Redmi K90 Ultra Tipped to Launch With Dimensity 9500 Chip, Active Cooling Fan
  10. Mozilla Firefox Will Let You Decide How Much AI You Want in Your Browser
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.