US registers cyber-theft concerns with Chinese government

Advertisement
By Reuters | Updated: 20 February 2013 17:45 IST
A secretive Chinese military unit is believed to be behind a series of hacking attacks, a U.S. computer security company said, prompting a strong denial by China and accusations that it was in fact the victim of U.S. hacking.

The company, Mandiant, identified the People's Liberation Army's Shanghai-based Unit 61398 as the most likely driving force behind the hacking. Mandiant said it believed the unit had carried out "sustained" attacks on a wide range of industries.

"The nature of 'Unit 61398's' work is considered by China to be a state secret; however, we believe it engages in harmful 'Computer Network Operations'," Mandiant said in a report released in the United States on Monday.

"It is time to acknowledge the threat is originating in China, and we wanted to do our part to arm and prepare security professionals to combat that threat effectively," it said.

Advertisement

China's Defence Ministry issued a flat denial of the accusations and called them "unprofessional". It said hacking attacks are a global problem and that China is one of world's biggest victims of cyber assaults.

Advertisement

"The Chinese army has never supported any hacking activity," the Defence Ministry said in a brief faxed statement to Reuters. "Statements about the Chinese army engaging in cyber attacks are unprofessional and not in line with facts."

Unit 61398 is located in Shanghai's Pudong district, China's financial and banking hub, and is staffed by perhaps thousands of people proficient in English as well as computer programming and network operations, Mandiant said in its report.

Advertisement

The unit had stolen "hundreds of terabytes of data from at least 141 organisations across a diverse set of industries beginning as early as 2006", it said.

Most of the victims were located in the United States, with smaller numbers in Canada and Britain. The information stolen ranged from details on mergers and acquisitions to the emails of senior employees, the company said.

Advertisement

The 12-storey building, which houses the unit, sits in an unassuming residential area and is surrounded by a wall adorned with military propaganda photos and slogans; outside the gate a sign warns members of the public they are in a restricted military area and should not take pictures.

There were no obvious signs of extra security on Tuesday.

The Chinese Foreign Ministry said the government firmly opposed hacking, adding that it doubted the evidence provided in the U.S. security group's report.

"Hacking attacks are transnational and anonymous. Determining their origins are extremely difficult. We don't know how the evidence in this so-called report can be tenable," spokesman Hong Lei told a daily news briefing.

"Arbitrary criticism based on rudimentary data is irresponsible, unprofessional and not helpful in resolving the issue."

Hong cited a Chinese study which pointed to the United States as being behind hacking in China.

"Of the above mentioned Internet hacking attacks, attacks originating from the United States rank first."

"Economic cyber espionage"
Some experts said they doubted Chinese government denials.

"The PLA plays a key role in China's multi-faceted security strategy, so it makes sense that its resources would be used to facilitate economic cyber espionage that helps the Chinese economy," said Dmitri Alperovitch, chief technology officer and co-founder of CrowdStrike, one of Mandiant's competitors.

Though privately held and little known to the general public, Mandiant is one of a handful of U.S. cyber-security companies that specialise in attempting to detect, prevent and trace the most advanced hacking attacks, instead of the garden-variety viruses and criminal intrusions that befoul corporate networks on a daily basis.

But Mandiant does not promote its analysis in public and only rarely issues topical papers about changes in techniques or behaviours.

It has never before given the apparent proper names of suspected hackers or directly tied them to a military branch of the Chinese government, giving the new report special resonance.

The company published details of the attack programmes and dummy websites used to infiltrate U.S. companies, typically via deceptive emails.

U.S. officials have complained in the past to China about sanctioned trade-secret theft, but have had a limited public record to point to.

Mandiant said it knew the PLA would shift tactics and programmes in response to its report but concluded that the disclosure was worth it because of the scale of the harm and the ability of China to issue denials in the past and duck accountability.

The company traced Unit 61398's presence on the Internet - including registration data for a question-and-answer session with a Chinese professor and numeric Internet addresses within a block assigned to the PLA unit - and concluded that it was a major contributor to operations against the U.S. companies.

Members of Congress and intelligence authorities in the United States have publicised the same general conclusions: that economic espionage is an official mission of the PLA and other elements of the Chinese government, and that hacking is a primary method.

In November 2011, the U.S. National Counterintelligence Executive publicly decried China in particular as the biggest known thief of U.S. trade secrets.

The Mandiant report comes a week after U.S. President Barack Obama issued a long-awaited executive order aimed at getting the private owners of power plants and other critical infrastructure to share data on attacks with officials and to begin to follow consensus best practices on security.

Both U.S. Democrats and Republicans have said more powerful legislation is needed, citing Chinese penetration not just of the largest companies but of operations essential to a functioning country, including those comprising the electric grid.

© Thomson Reuters 2013

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Nothing Phone 4a Series Tipped to Launch Globally on This Date
  2. How to Reset Your Instagram Reels Algorithm
  3. iQOO 15R Battery Capacity, Thickness Announced by Company
  4. OpenAI Introduces Codex App With Agentic Coding for macOS
  5. Redmi K Pad 2 Tipped to Feature Bose-Tuned Speakers and This MediaTek Chip
  6. Parasakthi OTT Release Revealed: When and Where to Watch it Online?
  7. Vivo X200T Is Now Available for Purchase in India: See Price, Offers
  1. Psych Siddhartha OTT Release Date: When and Where to Watch it Online?
  2. Parasakthi OTT Release Revealed: When and Where to Watch Sivakarthikeyan Starrer Movie Online?
  3. Vivo X300 Max Tipped to Launch in March Alongside the Vivo X300 Ultra: Expected Specifications, Features
  4. Sampradayini Suppini Suddapoosani Now Streaming Online: What You Need to Know
  5. Lucky The Superstar OTT Release Date Revealed: Know When and Where to Watch This Upcoming Tamil Comedy Drama Film
  6. Redmi K Pad 2 Tipped to Launch With MediaTek Dimensity 9500 SoC, Bose-Tuned Speakers
  7. Nioh 3 Will Be a PS5 Console Exclusive for 6 Months, Could Launch on Other Platforms Later This Year
  8. Nothing Phone 4a Series Tipped to Launch Globally Next Month: Expected Specifications, Features
  9. Vivo X200T With Triple 50-Megapixel Zeiss Cameras Goes on Sale in India: Price, Offers
  10. Infinix Note 60, Note 60 Pro, Note 60 Ultra Memory Variants Leaked Ahead of Anticipated Launch in India
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.